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"}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:07 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000080)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:07 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x10842, 0x2) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0xc44) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:07 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf9fdffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:07 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file1\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)) r3 = dup2(r1, r0) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r3, 0xc0884113, &(0x7f0000000280)={0x1, 0x3, 0x5, 0x6, 0x4, 0x8, 0xfffffffeffffffff, 0xffff, 0x3f, 0x8, 0xffffffff}) [ 449.901581][T31162] affs: No valid root block on device loop2 05:17:07 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000880)={0x0, 0x0, {}, {0x0, @struct}, {0x0, @struct}}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, &(0x7f0000000140)=0x13) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000080), &(0x7f0000000100)=0x4) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) fcntl$setstatus(r4, 0x4, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000200)={'bond0\x00'}) fchown(r5, 0xee00, 0x0) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:07 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000880)={0x0, 0x0, {}, {0x0, @struct}, {0x0, @struct}}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, &(0x7f0000000140)=0x13) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000080), &(0x7f0000000100)=0x4) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) fcntl$setstatus(r4, 0x4, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000200)={'bond0\x00'}) fchown(r5, 0xee00, 0x0) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xff0f000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 450.138864][T31162] affs: No valid root block on device loop2 05:17:07 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0xffffefff, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:07 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x80000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:07 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000880)={0x0, 0x0, {}, {0x0, @struct}, {0x0, @struct}}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, &(0x7f0000000140)=0x13) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000080), &(0x7f0000000100)=0x4) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) fcntl$setstatus(r4, 0x4, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000200)={'bond0\x00'}) fchown(r5, 0xee00, 0x0) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:07 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfdfdffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:07 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000880)={0x0, 0x0, {}, {0x0, @struct}, {0x0, @struct}}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, &(0x7f0000000140)=0x13) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000080), &(0x7f0000000100)=0x4) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) fcntl$setstatus(r4, 0x4, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000200)={'bond0\x00'}) fchown(r5, 0xee00, 0x0) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:07 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000880)={0x0, 0x0, {}, {0x0, @struct}, {0x0, @struct}}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, &(0x7f0000000140)=0x13) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000080), &(0x7f0000000100)=0x4) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) fcntl$setstatus(r4, 0x4, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000200)={'bond0\x00'}) fchown(r5, 0xee00, 0x0) 05:17:07 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000880)={0x0, 0x0, {}, {0x0, @struct}, {0x0, @struct}}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, &(0x7f0000000140)=0x13) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000080), &(0x7f0000000100)=0x4) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) fcntl$setstatus(r4, 0x4, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r5, 0xee00, 0x0) 05:17:07 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000880)={0x0, 0x0, {}, {0x0, @struct}, {0x0, @struct}}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, &(0x7f0000000140)=0x13) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000080), &(0x7f0000000100)=0x4) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) fcntl$setstatus(r4, 0x4, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) 05:17:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffefffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:08 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000880)={0x0, 0x0, {}, {0x0, @struct}, {0x0, @struct}}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, &(0x7f0000000140)=0x13) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000080), &(0x7f0000000100)=0x4) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) fcntl$setstatus(r4, 0x4, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) [ 450.573631][T31267] affs: No valid root block on device loop2 05:17:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xedc000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 450.726753][T31267] affs: No valid root block on device loop2 05:17:08 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000880)={0x0, 0x0, {}, {0x0, @struct}, {0x0, @struct}}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, &(0x7f0000000140)=0x13) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000080), &(0x7f0000000100)=0x4) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) fcntl$setstatus(r4, 0x4, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) 05:17:08 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0xfffff7ff, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:08 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000880)={0x0, 0x0, {}, {0x0, @struct}, {0x0, @struct}}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, &(0x7f0000000140)=0x13) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000080), &(0x7f0000000100)=0x4) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r5, 0xee00, 0x0) 05:17:08 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfdffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:08 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000880)={0x0, 0x0, {}, {0x0, @struct}, {0x0, @struct}}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, &(0x7f0000000140)=0x13) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000080), &(0x7f0000000100)=0x4) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r4, 0xee00, 0x0) 05:17:08 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x14c800000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:08 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000880)={0x0, 0x0, {}, {0x0, @struct}, {0x0, @struct}}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, &(0x7f0000000140)=0x13) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000080), &(0x7f0000000100)=0x4) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r4, 0xee00, 0x0) 05:17:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 451.082602][T31322] affs: No valid root block on device loop2 05:17:08 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000880)={0x0, 0x0, {}, {0x0, @struct}, {0x0, @struct}}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, &(0x7f0000000140)=0x13) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000080), &(0x7f0000000100)=0x4) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r4, 0xee00, 0x0) 05:17:08 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000880)={0x0, 0x0, {}, {0x0, @struct}, {0x0, @struct}}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, &(0x7f0000000140)=0x13) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000080), &(0x7f0000000100)=0x4) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r3, 0xee00, 0x0) 05:17:08 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000880)={0x0, 0x0, {}, {0x0, @struct}, {0x0, @struct}}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, &(0x7f0000000140)=0x13) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000080), &(0x7f0000000100)=0x4) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r3, 0xee00, 0x0) [ 451.290517][T31322] affs: No valid root block on device loop2 05:17:08 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffbff, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:08 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000880)={0x0, 0x0, {}, {0x0, @struct}, {0x0, @struct}}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, &(0x7f0000000140)=0x13) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000080), &(0x7f0000000100)=0x4) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r3, 0xee00, 0x0) 05:17:08 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffdf9, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:08 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xff0f0000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:08 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffdfd, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x200000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:08 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:08 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000880)={0x0, 0x0, {}, {0x0, @struct}, {0x0, @struct}}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, &(0x7f0000000140)=0x13) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000080), &(0x7f0000000100)=0x4) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r4, 0xee00, 0x0) 05:17:09 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000880)={0x0, 0x0, {}, {0x0, @struct}, {0x0, @struct}}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, &(0x7f0000000140)=0x13) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000080), &(0x7f0000000100)=0x4) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r4, 0xee00, 0x0) 05:17:09 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:09 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000880)={0x0, 0x0, {}, {0x0, @struct}, {0x0, @struct}}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, &(0x7f0000000140)=0x13) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000080), &(0x7f0000000100)=0x4) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r4, 0xee00, 0x0) 05:17:09 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000880)={0x0, 0x0, {}, {0x0, @struct}, {0x0, @struct}}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, &(0x7f0000000140)=0x13) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000080), &(0x7f0000000100)=0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r5, 0xee00, 0x0) 05:17:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x204000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 451.787705][T31392] affs: No valid root block on device loop2 05:17:09 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000880)={0x0, 0x0, {}, {0x0, @struct}, {0x0, @struct}}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, &(0x7f0000000140)=0x13) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000080), &(0x7f0000000100)=0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r5, 0xee00, 0x0) [ 451.998858][T31392] affs: No valid root block on device loop2 05:17:09 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffefffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:09 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000880)={0x0, 0x0, {}, {0x0, @struct}, {0x0, @struct}}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, &(0x7f0000000140)=0x13) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000080), &(0x7f0000000100)=0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r5, 0xee00, 0x0) 05:17:09 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffdff, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:09 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:09 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:09 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000880)={0x0, 0x0, {}, {0x0, @struct}, {0x0, @struct}}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, &(0x7f0000000140)=0x13) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r5, 0xee00, 0x0) 05:17:09 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000880)={0x0, 0x0, {}, {0x0, @struct}, {0x0, @struct}}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, &(0x7f0000000140)=0x13) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r5, 0xee00, 0x0) 05:17:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x300000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 452.265212][T31449] affs: No valid root block on device loop2 05:17:09 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000880)={0x0, 0x0, {}, {0x0, @struct}, {0x0, @struct}}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, &(0x7f0000000140)=0x13) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r5, 0xee00, 0x0) 05:17:09 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000880)={0x0, 0x0, {}, {0x0, @struct}, {0x0, @struct}}) r1 = socket$packet(0x11, 0x3, 0x300) dup(r1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r4, 0xee00, 0x0) 05:17:09 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 452.418049][T31449] affs: No valid root block on device loop2 05:17:09 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0xffffff7f, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:09 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffefff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:09 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000880)={0x0, 0x0, {}, {0x0, @struct}, {0x0, @struct}}) socket$packet(0x11, 0x3, 0x300) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r3, 0xee00, 0x0) 05:17:09 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000880)={0x0, 0x0, {}, {0x0, @struct}, {0x0, @struct}}) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r3, 0xee00, 0x0) 05:17:10 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:10 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r2, 0xee00, 0x0) 05:17:10 executing program 4: execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r2, 0xee00, 0x0) 05:17:10 executing program 4: execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r2, 0xee00, 0x0) 05:17:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x400000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:10 executing program 4: execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r2, 0xee00, 0x0) 05:17:10 executing program 4: open(0x0, 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r2, 0xee00, 0x0) [ 452.827699][T31519] affs: No valid root block on device loop2 05:17:10 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 453.012236][T31519] affs: No valid root block on device loop2 05:17:10 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0xffffff8c, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:10 executing program 4: open(0x0, 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r2, 0xee00, 0x0) 05:17:10 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x500000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:10 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffdf9, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:10 executing program 4: open(0x0, 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r2, 0xee00, 0x0) 05:17:10 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x0, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r2, 0xee00, 0x0) 05:17:10 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x0, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r2, 0xee00, 0x0) 05:17:10 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x0, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r2, 0xee00, 0x0) 05:17:10 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r2, 0xee00, 0x0) 05:17:10 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r2, 0xee00, 0x0) [ 453.303527][T31569] affs: No valid root block on device loop2 05:17:10 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 453.568620][T31569] affs: No valid root block on device loop2 05:17:11 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffff6, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:11 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r2, 0xee00, 0x0) 05:17:11 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffdfd, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:11 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x100010000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x600000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:11 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r2, 0xee00, 0x0) 05:17:11 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r2, 0xee00, 0x0) 05:17:11 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r2, 0xee00, 0x0) 05:17:11 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r2, 0xee00, 0x0) 05:17:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:11 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffb, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x604000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:11 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r2, 0xee00, 0x0) 05:17:11 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x200000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:11 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffff8c, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:11 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r2, 0xee00, 0x0) [ 454.095723][T31652] affs: No valid root block on device loop2 05:17:11 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r1, 0xee00, 0x0) 05:17:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x700000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:11 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r1, 0xee00, 0x0) 05:17:11 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r1, 0xee00, 0x0) 05:17:11 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r1, 0xee00, 0x0) 05:17:11 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x8000000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:11 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r1, 0xee00, 0x0) 05:17:11 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r1, 0xee00, 0x0) 05:17:11 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x204000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:11 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r1, 0xee00, 0x0) 05:17:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x800000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:11 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffff97, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:11 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r1, 0xee00, 0x0) 05:17:12 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r1, 0xee00, 0x0) 05:17:12 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r2, 0xee00, 0x0) 05:17:12 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r2, 0xee00, 0x0) [ 454.626026][T31710] affs: No valid root block on device loop2 [ 454.773874][T31710] affs: No valid root block on device loop2 05:17:12 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0xedc000000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:12 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r2, 0xee00, 0x0) 05:17:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x300, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x900000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:12 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x300000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:12 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffff6, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:12 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(0xffffffffffffffff, 0xee00, 0x0) 05:17:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xa00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:12 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(0xffffffffffffffff, 0xee00, 0x0) [ 455.081595][T31774] affs: No valid root block on device loop2 05:17:12 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(0xffffffffffffffff, 0xee00, 0x0) 05:17:12 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:12 executing program 4: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0xffffff8c, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) [ 455.281656][T31774] affs: No valid root block on device loop2 05:17:12 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x1000000000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:12 executing program 4: open(0x0, 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r2, 0xee00, 0x0) 05:17:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7000, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:12 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:13 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x400000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xb00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:13 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000880)={0x0, 0x0, {}, {0x0, @struct}, {0x0, @struct}}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, &(0x7f0000000140)=0x13) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000080), &(0x7f0000000100)=0x4) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) fcntl$setstatus(r4, 0x4, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) 05:17:13 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 455.583914][T31824] affs: No valid root block on device loop2 05:17:13 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000880)={0x0, 0x0, {}, {0x0, @struct}, {0x0, @struct}}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) ioctl$BINDER_SET_MAX_THREADS(r2, 0x40046205, &(0x7f0000000140)=0x13) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000080), &(0x7f0000000100)=0x4) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) fcntl$setstatus(r4, 0x4, 0x0) fchown(0xffffffffffffffff, 0xee00, 0x0) [ 455.736250][T31824] affs: No valid root block on device loop2 05:17:13 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x97ffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:13 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x2000000000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:13 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r1 = syz_mount_image$nfs(&(0x7f0000000200)='nfs\x00', &(0x7f0000000380)='./file0\x00', 0x5, 0x2, &(0x7f0000000440)=[{&(0x7f00000003c0)="ea4e5a466bd152ec62b99a9c375dbeb451b724f8a340a0bb937117fd127d4af619e9b584cacea5c8b82ee01d13710b1ec03746a5b9dd1631aa7dac45393734b58a9d30c7d6b0e1662ed1126ec7b74dc1526a1e16d3fbe6b435199c", 0x5b, 0x1000}, {&(0x7f00000004c0)="323a925fd4052d8ec675f0cd706b33d613051a8a0c764947354c40d7ae9e94ef7e013b296873ca29f5642060b56e64ecc9b1e187b0e7a332c8c6e9c980768c2c61d606535b94aa77f2cbbb8c573e36c294d6461a3f34ab67032c891fb297a8a9125575196a348152996ef1ba91831713a4f80329cf42fd", 0x77, 0x7}], 0x200000, &(0x7f0000000540)={[{'\x00'}, {'\x00\x00\x00\x00\x00\x04\x02\x00'}, {'\x00'}, {'+\xf0\x85'}, {}], [{@fsuuid={'fsuuid', 0x3d, {[0x37, 0x36, 0x31, 0x37, 0x33, 0x62, 0x65, 0x33], 0x2d, [0x32, 0x53, 0x66, 0x30], 0x2d, [0x39, 0x65, 0x66, 0x63], 0x2d, [0x65, 0x34, 0x34, 0x63], 0x2d, [0x31, 0x32, 0x33, 0x38, 0x6, 0x65, 0x36, 0x30]}}}]}) ioctl$FIONCLEX(r1, 0x5450) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(r0, 0x7a6, &(0x7f00000001c0)={0x2000000000000000, 0x8, 0xfffffffffffffff7, 0x7a, 0x4, 0x3f}) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x4102, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r4, 0x400442c8, &(0x7f0000000280)={r2, 0x1ff, 0x401, "98381a8fccc522bd850d2fabe5c957f6ff72d0b418eb6e70c20bc50984ed697f1f4e964ca41d037c6f853f23a1c3497fc4303cadde647e45bfabdeaa488ea3164d357c10ca91dd5181f32301b5e2fc7e257ce8f90a84a92e5a89d8329399eb315187a98f6a8a7bb0c23edf3a44e67748f8d63847c873db51c0e0ff2dd3627ed881108011e7c53e39408fc3817f159ba1c32168cf82ee7d04df0c06861ec0485582a287eef4ff5fdf6d5a64c2c8384dc21619a7a2a6c468"}) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000080)='\x00', &(0x7f00000000c0)='\x00\x00\x00\x00\x00\x04\x02\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:13 executing program 4: dup(0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000580)={'ip6_vti0\x00', &(0x7f0000000500)={'ip6tnl0\x00', 0x0, 0x29, 0xfc, 0x9, 0xffffffff, 0x12, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8, 0x40, 0x8, 0x80}}) r3 = socket$packet(0x11, 0x3, 0x300) dup(r3) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(r3, r3) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) bind$packet(r3, &(0x7f0000000640)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @link_local}, 0x14) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)={0x31c, 0x0, 0x200, 0x70bd28, 0x25dfdbfb, {}, [@HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0x31c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000080) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2000012, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=unix,access=', @ANYRESDEC=0xee01, @ANYBLOB="2c63616368653d667363616368652c00e48c73827769805fc0a2c82e87fd7bde382a5e7a869553c1142adfecbbab4ac8f37ea68a60cfefcf7e105f764c01b99d4f6f94b9be3206c680fe02675fc63965d7a8ebc94d624ab41f81fcc11d17b44df4788d741cd66466578d5e9731c1b99df74d2f0b9854d611d4100e"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:13 executing program 4: dup(0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000580)={'ip6_vti0\x00', &(0x7f0000000500)={'ip6tnl0\x00', 0x0, 0x29, 0xfc, 0x9, 0xffffffff, 0x12, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8, 0x40, 0x8, 0x80}}) r3 = socket$packet(0x11, 0x3, 0x300) dup(r3) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(r3, r3) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) bind$packet(r3, &(0x7f0000000640)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @link_local}, 0x14) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)={0x31c, 0x0, 0x200, 0x70bd28, 0x25dfdbfb, {}, [@HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0x31c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000080) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2000012, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=unix,access=', @ANYRESDEC=0xee01, @ANYBLOB="2c63616368653d667363616368652c00e48c73827769805fc0a2c82e87fd7bde382a5e7a869553c1142adfecbbab4ac8f37ea68a60cfefcf7e105f764c01b99d4f6f94b9be3206c680fe02675fc63965d7a8ebc94d624ab41f81fcc11d17b44df4788d741cd66466578d5e9731c1b99df74d2f0b9854d611d4100e"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) [ 455.944797][T31869] 9pnet: p9_fd_create_unix (31869): problem connecting socket: ./file0: -111 [ 456.026889][T31881] 9pnet: p9_fd_create_unix (31881): problem connecting socket: ./file0: -111 [ 456.073264][T31876] affs: No valid root block on device loop2 05:17:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2fdfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:13 executing program 4: dup(0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000580)={'ip6_vti0\x00', &(0x7f0000000500)={'ip6tnl0\x00', 0x0, 0x29, 0xfc, 0x9, 0xffffffff, 0x12, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8, 0x40, 0x8, 0x80}}) r3 = socket$packet(0x11, 0x3, 0x300) dup(r3) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(r3, r3) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) bind$packet(r3, &(0x7f0000000640)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @link_local}, 0x14) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)={0x31c, 0x0, 0x200, 0x70bd28, 0x25dfdbfb, {}, [@HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0x31c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000080) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2000012, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=unix,access=', @ANYRESDEC=0xee01, @ANYBLOB="2c63616368653d667363616368652c00e48c73827769805fc0a2c82e87fd7bde382a5e7a869553c1142adfecbbab4ac8f37ea68a60cfefcf7e105f764c01b99d4f6f94b9be3206c680fe02675fc63965d7a8ebc94d624ab41f81fcc11d17b44df4788d741cd66466578d5e9731c1b99df74d2f0b9854d611d4100e"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xc00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:13 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x500000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:13 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x80000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:13 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x4000000000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) [ 456.260000][T31894] 9pnet: p9_fd_create_unix (31894): problem connecting socket: ./file0: -111 05:17:13 executing program 4: dup(0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000580)={'ip6_vti0\x00', &(0x7f0000000500)={'ip6tnl0\x00', 0x0, 0x29, 0xfc, 0x9, 0xffffffff, 0x12, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8, 0x40, 0x8, 0x80}}) r3 = socket$packet(0x11, 0x3, 0x300) dup(r3) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(r3, r3) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) bind$packet(r3, &(0x7f0000000640)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @link_local}, 0x14) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)={0x31c, 0x0, 0x200, 0x70bd28, 0x25dfdbfb, {}, [@HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0x31c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000080) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2000012, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=unix,access=', @ANYRESDEC=0xee01, @ANYBLOB="2c63616368653d667363616368652c00e48c73827769805fc0a2c82e87fd7bde382a5e7a869553c1142adfecbbab4ac8f37ea68a60cfefcf7e105f764c01b99d4f6f94b9be3206c680fe02675fc63965d7a8ebc94d624ab41f81fcc11d17b44df4788d741cd66466578d5e9731c1b99df74d2f0b9854d611d4100e"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) 05:17:13 executing program 4: dup(0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000580)={'ip6_vti0\x00', &(0x7f0000000500)={'ip6tnl0\x00', 0x0, 0x29, 0xfc, 0x9, 0xffffffff, 0x12, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8, 0x40, 0x8, 0x80}}) r3 = socket$packet(0x11, 0x3, 0x300) dup(r3) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(r3, r3) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) bind$packet(r3, &(0x7f0000000640)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @link_local}, 0x14) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)={0x31c, 0x0, 0x200, 0x70bd28, 0x25dfdbfb, {}, [@HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0x31c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000080) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2000012, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=unix,access=', @ANYRESDEC=0xee01, @ANYBLOB="2c63616368653d667363616368652c00e48c73827769805fc0a2c82e87fd7bde382a5e7a869553c1142adfecbbab4ac8f37ea68a60cfefcf7e105f764c01b99d4f6f94b9be3206c680fe02675fc63965d7a8ebc94d624ab41f81fcc11d17b44df4788d741cd66466578d5e9731c1b99df74d2f0b9854d611d4100e"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) [ 456.373150][T31919] 9pnet: p9_fd_create_unix (31919): problem connecting socket: ./file0: -111 05:17:13 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xedc000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 456.422735][T31917] affs: No valid root block on device loop2 05:17:13 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x6000000000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) [ 456.482646][T31927] 9pnet: p9_fd_create_unix (31927): problem connecting socket: ./file0: -111 05:17:13 executing program 4: dup(0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000580)={'ip6_vti0\x00', &(0x7f0000000500)={'ip6tnl0\x00', 0x0, 0x29, 0xfc, 0x9, 0xffffffff, 0x12, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8, 0x40, 0x8, 0x80}}) r3 = socket$packet(0x11, 0x3, 0x300) dup(r3) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(r3, r3) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) bind$packet(r3, &(0x7f0000000640)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @link_local}, 0x14) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)={0x31c, 0x0, 0x200, 0x70bd28, 0x25dfdbfb, {}, [@HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0x31c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000080) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2000012, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=unix,access=', @ANYRESDEC=0xee01, @ANYBLOB="2c63616368653d667363616368652c00e48c73827769805fc0a2c82e87fd7bde382a5e7a869553c1142adfecbbab4ac8f37ea68a60cfefcf7e105f764c01b99d4f6f94b9be3206c680fe02675fc63965d7a8ebc94d624ab41f81fcc11d17b44df4788d741cd66466578d5e9731c1b99df74d2f0b9854d611d4100e"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 05:17:13 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 456.599674][T31939] 9pnet: p9_fd_create_unix (31939): problem connecting socket: ./file0: -111 05:17:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be5cdfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xd00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:14 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x600000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:14 executing program 4: dup(0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000580)={'ip6_vti0\x00', &(0x7f0000000500)={'ip6tnl0\x00', 0x0, 0x29, 0xfc, 0x9, 0xffffffff, 0x12, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8, 0x40, 0x8, 0x80}}) r3 = socket$packet(0x11, 0x3, 0x300) dup(r3) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(r3, r3) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) bind$packet(r3, &(0x7f0000000640)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @link_local}, 0x14) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)={0x31c, 0x0, 0x200, 0x70bd28, 0x25dfdbfb, {}, [@HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0x31c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000080) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2000012, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=unix,access=', @ANYRESDEC=0xee01, @ANYBLOB="2c63616368653d667363616368652c00e48c73827769805fc0a2c82e87fd7bde382a5e7a869553c1142adfecbbab4ac8f37ea68a60cfefcf7e105f764c01b99d4f6f94b9be3206c680fe02675fc63965d7a8ebc94d624ab41f81fcc11d17b44df4788d741cd66466578d5e9731c1b99df74d2f0b9854d611d4100e"]) 05:17:14 executing program 4: dup(0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000580)={'ip6_vti0\x00', &(0x7f0000000500)={'ip6tnl0\x00', 0x0, 0x29, 0xfc, 0x9, 0xffffffff, 0x12, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8, 0x40, 0x8, 0x80}}) r3 = socket$packet(0x11, 0x3, 0x300) dup(r3) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(r3, r3) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) bind$packet(r3, &(0x7f0000000640)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @link_local}, 0x14) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)={0x31c, 0x0, 0x200, 0x70bd28, 0x25dfdbfb, {}, [@HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0x31c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000080) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2000012, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=unix,access=', @ANYRESDEC=0xee01, @ANYBLOB="2c63616368653d667363616368652c00e48c73827769805fc0a2c82e87fd7bde382a5e7a869553c1142adfecbbab4ac8f37ea68a60cfefcf7e105f764c01b99d4f6f94b9be3206c680fe02675fc63965d7a8ebc94d624ab41f81fcc11d17b44df4788d741cd66466578d5e9731c1b99df74d2f0b9854d611d4100e"]) 05:17:14 executing program 4: dup(0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000580)={'ip6_vti0\x00', &(0x7f0000000500)={'ip6tnl0\x00', 0x0, 0x29, 0xfc, 0x9, 0xffffffff, 0x12, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8, 0x40, 0x8, 0x80}}) r3 = socket$packet(0x11, 0x3, 0x300) dup(r3) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(r3, r3) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) bind$packet(r3, &(0x7f0000000640)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @link_local}, 0x14) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)={0x31c, 0x0, 0x200, 0x70bd28, 0x25dfdbfb, {}, [@HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0x31c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000080) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2000012, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=unix,access=', @ANYRESDEC=0xee01, @ANYBLOB="2c63616368653d667363616368652c00e48c73827769805fc0a2c82e87fd7bde382a5e7a869553c1142adfecbbab4ac8f37ea68a60cfefcf7e105f764c01b99d4f6f94b9be3206c680fe02675fc63965d7a8ebc94d624ab41f81fcc11d17b44df4788d741cd66466578d5e9731c1b99df74d2f0b9854d611d4100e"]) [ 456.695621][T31947] 9pnet: p9_fd_create_unix (31947): problem connecting socket: ./file0: -111 [ 456.730961][T31951] 9pnet: p9_fd_create_unix (31951): problem connecting socket: ./file0: -111 05:17:14 executing program 4: dup(0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000580)={'ip6_vti0\x00', &(0x7f0000000500)={'ip6tnl0\x00', 0x0, 0x29, 0xfc, 0x9, 0xffffffff, 0x12, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8, 0x40, 0x8, 0x80}}) r3 = socket$packet(0x11, 0x3, 0x300) dup(r3) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(r3, r3) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) bind$packet(r3, &(0x7f0000000640)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @link_local}, 0x14) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)={0x31c, 0x0, 0x200, 0x70bd28, 0x25dfdbfb, {}, [@HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0x31c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000080) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2000012, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=unix,access=', @ANYRESDEC=0xee01, @ANYBLOB="2c63616368653d667363616368652c00e48c73827769805fc0a2c82e87fd7bde382a5e7a869553c1142adfecbbab4ac8f37ea68a60cfefcf7e105f764c01b99d4f6f94b9be3206c680fe02675fc63965d7a8ebc94d624ab41f81fcc11d17b44df4788d741cd66466578d5e9731c1b99df74d2f0b9854d611d4100e"]) 05:17:14 executing program 4: dup(0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000580)={'ip6_vti0\x00', &(0x7f0000000500)={'ip6tnl0\x00', 0x0, 0x29, 0xfc, 0x9, 0xffffffff, 0x12, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8, 0x40, 0x8, 0x80}}) r3 = socket$packet(0x11, 0x3, 0x300) dup(r3) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(r3, r3) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) bind$packet(r3, &(0x7f0000000640)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @link_local}, 0x14) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)={0x31c, 0x0, 0x200, 0x70bd28, 0x25dfdbfb, {}, [@HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0x31c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000080) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2000012, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=unix,access=', @ANYRESDEC=0xee01, @ANYBLOB="2c63616368653d667363616368652c00e48c73827769805fc0a2c82e87fd7bde382a5e7a869553c1142adfecbbab4ac8f37ea68a60cfefcf7e105f764c01b99d4f6f94b9be3206c680fe02675fc63965d7a8ebc94d624ab41f81fcc11d17b44df4788d741cd66466578d5e9731c1b99df74d2f0b9854d611d4100e"]) 05:17:14 executing program 4: dup(0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000580)={'ip6_vti0\x00', &(0x7f0000000500)={'ip6tnl0\x00', 0x0, 0x29, 0xfc, 0x9, 0xffffffff, 0x12, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8, 0x40, 0x8, 0x80}}) r2 = socket$packet(0x11, 0x3, 0x300) dup(r2) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(r2, r2) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2000012, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=unix,access=', @ANYRESDEC=0xee01, @ANYBLOB="2c63616368653d667363616368652c00e48c73827769805fc0a2c82e87fd7bde382a5e7a869553c1142adfecbbab4ac8f37ea68a60cfefcf7e105f764c01b99d4f6f94b9be3206c680fe02675fc63965d7a8ebc94d624ab41f81fcc11d17b44df4788d741cd66466578d5e9731c1b99df74d2f0b9854d611d4100e"]) [ 456.856356][T31968] 9pnet: p9_fd_create_unix (31968): problem connecting socket: ./file0: -111 [ 456.884267][T31936] affs: No valid root block on device loop2 05:17:14 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:14 executing program 4: dup(0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000580)={'ip6_vti0\x00', &(0x7f0000000500)={'ip6tnl0\x00', 0x0, 0x29, 0xfc, 0x9, 0xffffffff, 0x12, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8, 0x40, 0x8, 0x80}}) r2 = socket$packet(0x11, 0x3, 0x300) dup(r2) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(r2, r2) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000200)={'bond0\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2000012, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=unix,access=', @ANYRESDEC=0xee01, @ANYBLOB="2c63616368653d667363616368652c00e48c73827769805fc0a2c82e87fd7bde382a5e7a869553c1142adfecbbab4ac8f37ea68a60cfefcf7e105f764c01b99d4f6f94b9be3206c680fe02675fc63965d7a8ebc94d624ab41f81fcc11d17b44df4788d741cd66466578d5e9731c1b99df74d2f0b9854d611d4100e"]) [ 457.016428][T31979] 9pnet: p9_fd_create_unix (31979): problem connecting socket: ./file0: -111 05:17:14 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:14 executing program 4: dup(0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000580)={'ip6_vti0\x00', &(0x7f0000000500)={'ip6tnl0\x00', 0x0, 0x29, 0xfc, 0x9, 0xffffffff, 0x12, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8, 0x40, 0x8, 0x80}}) r2 = socket$packet(0x11, 0x3, 0x300) dup(r2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(r2, r2) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2000012, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=unix,access=', @ANYRESDEC=0xee01, @ANYBLOB="2c63616368653d667363616368652c00e48c73827769805fc0a2c82e87fd7bde382a5e7a869553c1142adfecbbab4ac8f37ea68a60cfefcf7e105f764c01b99d4f6f94b9be3206c680fe02675fc63965d7a8ebc94d624ab41f81fcc11d17b44df4788d741cd66466578d5e9731c1b99df74d2f0b9854d611d4100e"]) 05:17:14 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x604000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xe00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee03257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:14 executing program 4: dup(0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000580)={'ip6_vti0\x00', &(0x7f0000000500)={'ip6tnl0\x00', 0x0, 0x29, 0xfc, 0x9, 0xffffffff, 0x12, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8, 0x40, 0x8, 0x80}}) r2 = socket$packet(0x11, 0x3, 0x300) dup(r2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2000012, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=unix,access=', @ANYRESDEC=0xee01, @ANYBLOB="2c63616368653d667363616368652c00e48c73827769805fc0a2c82e87fd7bde382a5e7a869553c1142adfecbbab4ac8f37ea68a60cfefcf7e105f764c01b99d4f6f94b9be3206c680fe02675fc63965d7a8ebc94d624ab41f81fcc11d17b44df4788d741cd66466578d5e9731c1b99df74d2f0b9854d611d4100e"]) [ 457.191588][T31991] 9pnet: p9_fd_create_unix (31991): problem connecting socket: ./file0: -111 05:17:14 executing program 4: dup(0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000580)={'ip6_vti0\x00', &(0x7f0000000500)={'ip6tnl0\x00', 0x0, 0x29, 0xfc, 0x9, 0xffffffff, 0x12, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8, 0x40, 0x8, 0x80}}) r2 = socket$packet(0x11, 0x3, 0x300) dup(r2) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2000012, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=unix,access=', @ANYRESDEC=0xee01, @ANYBLOB="2c63616368653d667363616368652c00e48c73827769805fc0a2c82e87fd7bde382a5e7a869553c1142adfecbbab4ac8f37ea68a60cfefcf7e105f764c01b99d4f6f94b9be3206c680fe02675fc63965d7a8ebc94d624ab41f81fcc11d17b44df4788d741cd66466578d5e9731c1b99df74d2f0b9854d611d4100e"]) [ 457.270695][T32005] 9pnet: p9_fd_create_unix (32005): problem connecting socket: ./file0: -111 05:17:14 executing program 4: dup(0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000580)={'ip6_vti0\x00', &(0x7f0000000500)={'ip6tnl0\x00', 0x0, 0x29, 0xfc, 0x9, 0xffffffff, 0x12, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8, 0x40, 0x8, 0x80}}) socket$packet(0x11, 0x3, 0x300) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2000012, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=unix,access=', @ANYRESDEC=0xee01, @ANYBLOB="2c63616368653d667363616368652c00e48c73827769805fc0a2c82e87fd7bde382a5e7a869553c1142adfecbbab4ac8f37ea68a60cfefcf7e105f764c01b99d4f6f94b9be3206c680fe02675fc63965d7a8ebc94d624ab41f81fcc11d17b44df4788d741cd66466578d5e9731c1b99df74d2f0b9854d611d4100e"]) [ 457.312045][T32010] 9pnet: p9_fd_create_unix (32010): problem connecting socket: ./file0: -111 [ 457.342243][T31989] affs: No valid root block on device loop2 05:17:14 executing program 4: dup(0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000580)={'ip6_vti0\x00', &(0x7f0000000500)={'ip6tnl0\x00', 0x0, 0x29, 0xfc, 0x9, 0xffffffff, 0x12, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8, 0x40, 0x8, 0x80}}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2000012, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=unix,access=', @ANYRESDEC=0xee01, @ANYBLOB="2c63616368653d667363616368652c00e48c73827769805fc0a2c82e87fd7bde382a5e7a869553c1142adfecbbab4ac8f37ea68a60cfefcf7e105f764c01b99d4f6f94b9be3206c680fe02675fc63965d7a8ebc94d624ab41f81fcc11d17b44df4788d741cd66466578d5e9731c1b99df74d2f0b9854d611d4100e"]) [ 457.356941][T32013] 9pnet: p9_fd_create_unix (32013): problem connecting socket: ./file0: -111 05:17:14 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x8000000000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:14 executing program 4: dup(0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2000012, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=unix,access=', @ANYRESDEC=0xee01, @ANYBLOB="2c63616368653d667363616368652c00e48c73827769805fc0a2c82e87fd7bde382a5e7a869553c1142adfecbbab4ac8f37ea68a60cfefcf7e105f764c01b99d4f6f94b9be3206c680fe02675fc63965d7a8ebc94d624ab41f81fcc11d17b44df4788d741cd66466578d5e9731c1b99df74d2f0b9854d611d4100e"]) [ 457.395298][T32016] 9pnet: p9_fd_create_unix (32016): problem connecting socket: ./file0: -111 05:17:14 executing program 4: dup(0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'bond0\x00'}) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2000012, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=unix,access=', @ANYRESDEC=0xee01, @ANYBLOB="2c63616368653d667363616368652c00e48c73827769805fc0a2c82e87fd7bde382a5e7a869553c1142adfecbbab4ac8f37ea68a60cfefcf7e105f764c01b99d4f6f94b9be3206c680fe02675fc63965d7a8ebc94d624ab41f81fcc11d17b44df4788d741cd66466578d5e9731c1b99df74d2f0b9854d611d4100e"]) [ 457.480597][T32027] 9pnet: p9_fd_create_unix (32027): problem connecting socket: ./file0: -111 [ 457.565218][T32031] 9pnet: p9_fd_create_unix (32031): problem connecting socket: ./file0: -111 05:17:15 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:15 executing program 4: dup(0xffffffffffffffff) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2000012, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=unix,access=', @ANYRESDEC=0xee01, @ANYBLOB="2c63616368653d667363616368652c00e48c73827769805fc0a2c82e87fd7bde382a5e7a869553c1142adfecbbab4ac8f37ea68a60cfefcf7e105f764c01b99d4f6f94b9be3206c680fe02675fc63965d7a8ebc94d624ab41f81fcc11d17b44df4788d741cd66466578d5e9731c1b99df74d2f0b9854d611d4100e"]) 05:17:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee04257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:15 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x700000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 457.743134][T32036] affs: No valid root block on device loop2 05:17:15 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0xa000000000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:15 executing program 4: dup(0xffffffffffffffff) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2000012, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=unix,access=', @ANYRESDEC=0xee01, @ANYBLOB="2c63616368653d667363616368652c00e48c73827769805fc0a2c82e87fd7bde382a5e7a869553c1142adfecbbab4ac8f37ea68a60cfefcf7e105f764c01b99d4f6f94b9be3206c680fe02675fc63965d7a8ebc94d624ab41f81fcc11d17b44df4788d741cd66466578d5e9731c1b99df74d2f0b9854d611d4100e"]) [ 457.834142][T32048] 9pnet: p9_fd_create_unix (32048): problem connecting socket: ./file0: -111 [ 457.883015][T32057] 9pnet: p9_fd_create_unix (32057): problem connecting socket: ./file0: -111 05:17:15 executing program 4: dup(0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2000012, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=unix,access=', @ANYRESDEC=0xee01, @ANYBLOB="2c63616368653d667363616368652c00e48c73827769805fc0a2c82e87fd7bde382a5e7a869553c1142adfecbbab4ac8f37ea68a60cfefcf7e105f764c01b99d4f6f94b9be3206c680fe02675fc63965d7a8ebc94d624ab41f81fcc11d17b44df4788d741cd66466578d5e9731c1b99df74d2f0b9854d611d4100e"]) 05:17:15 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2000012, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=unix,access=', @ANYRESDEC=0xee01, @ANYBLOB="2c63616368653d667363616368652c00e48c73827769805fc0a2c82e87fd7bde382a5e7a869553c1142adfecbbab4ac8f37ea68a60cfefcf7e105f764c01b99d4f6f94b9be3206c680fe02675fc63965d7a8ebc94d624ab41f81fcc11d17b44df4788d741cd66466578d5e9731c1b99df74d2f0b9854d611d4100e"]) [ 457.970659][T32068] 9pnet: p9_fd_create_unix (32068): problem connecting socket: ./file0: -111 [ 458.004256][T32070] 9pnet: p9_fd_create_unix (32070): problem connecting socket: ./file0: -111 05:17:15 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x800000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:15 executing program 4: open(0x0, 0x40, 0x1) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2000012, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=unix,access=', @ANYRESDEC=0xee01, @ANYBLOB="2c63616368653d667363616368652c00e48c73827769805fc0a2c82e87fd7bde382a5e7a869553c1142adfecbbab4ac8f37ea68a60cfefcf7e105f764c01b99d4f6f94b9be3206c680fe02675fc63965d7a8ebc94d624ab41f81fcc11d17b44df4788d741cd66466578d5e9731c1b99df74d2f0b9854d611d4100e"]) 05:17:15 executing program 4: open(0x0, 0x40, 0x1) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2000012, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=unix,access=', @ANYRESDEC=0xee01, @ANYBLOB="2c63616368653d667363616368652c00e48c73827769805fc0a2c82e87fd7bde382a5e7a869553c1142adfecbbab4ac8f37ea68a60cfefcf7e105f764c01b99d4f6f94b9be3206c680fe02675fc63965d7a8ebc94d624ab41f81fcc11d17b44df4788d741cd66466578d5e9731c1b99df74d2f0b9854d611d4100e"]) [ 458.021148][T32065] affs: No valid root block on device loop2 05:17:15 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:15 executing program 4: open(0x0, 0x40, 0x1) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2000012, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=unix,access=', @ANYRESDEC=0xee01, @ANYBLOB="2c63616368653d667363616368652c00e48c73827769805fc0a2c82e87fd7bde382a5e7a869553c1142adfecbbab4ac8f37ea68a60cfefcf7e105f764c01b99d4f6f94b9be3206c680fe02675fc63965d7a8ebc94d624ab41f81fcc11d17b44df4788d741cd66466578d5e9731c1b99df74d2f0b9854d611d4100e"]) 05:17:15 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0xc000000000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee05257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:15 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x0, 0x1) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2000012, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=unix,access=', @ANYRESDEC=0xee01, @ANYBLOB="2c63616368653d667363616368652c00e48c73827769805fc0a2c82e87fd7bde382a5e7a869553c1142adfecbbab4ac8f37ea68a60cfefcf7e105f764c01b99d4f6f94b9be3206c680fe02675fc63965d7a8ebc94d624ab41f81fcc11d17b44df4788d741cd66466578d5e9731c1b99df74d2f0b9854d611d4100e"]) 05:17:15 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x0, 0x1) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2000012, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=unix,access=', @ANYRESDEC=0xee01, @ANYBLOB="2c63616368653d667363616368652c00e48c73827769805fc0a2c82e87fd7bde382a5e7a869553c1142adfecbbab4ac8f37ea68a60cfefcf7e105f764c01b99d4f6f94b9be3206c680fe02675fc63965d7a8ebc94d624ab41f81fcc11d17b44df4788d741cd66466578d5e9731c1b99df74d2f0b9854d611d4100e"]) 05:17:15 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x0, 0x1) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2000012, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=unix,access=', @ANYRESDEC=0xee01, @ANYBLOB="2c63616368653d667363616368652c00e48c73827769805fc0a2c82e87fd7bde382a5e7a869553c1142adfecbbab4ac8f37ea68a60cfefcf7e105f764c01b99d4f6f94b9be3206c680fe02675fc63965d7a8ebc94d624ab41f81fcc11d17b44df4788d741cd66466578d5e9731c1b99df74d2f0b9854d611d4100e"]) 05:17:15 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2000012, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=unix,access=', @ANYRESDEC=0xee01, @ANYBLOB="2c63616368653d667363616368652c00e48c73827769805fc0a2c82e87fd7bde382a5e7a869553c1142adfecbbab4ac8f37ea68a60cfefcf7e105f764c01b99d4f6f94b9be3206c680fe02675fc63965d7a8ebc94d624ab41f81fcc11d17b44df4788d741cd66466578d5e9731c1b99df74d2f0b9854d611d4100e"]) [ 458.425951][T32113] 9pnet: p9_fd_create_unix (32113): problem connecting socket: ./file0: -111 [ 458.455556][T32105] affs: No valid root block on device loop2 05:17:15 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x900000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:15 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) mount$9p_unix(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2000012, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=unix,access=', @ANYRESDEC=0xee01, @ANYBLOB="2c63616368653d667363616368652c00e48c73827769805fc0a2c82e87fd7bde382a5e7a869553c1142adfecbbab4ac8f37ea68a60cfefcf7e105f764c01b99d4f6f94b9be3206c680fe02675fc63965d7a8ebc94d624ab41f81fcc11d17b44df4788d741cd66466578d5e9731c1b99df74d2f0b9854d611d4100e"]) 05:17:15 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x200000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:15 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0xe000000000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1100000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:15 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) mount$9p_unix(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2000012, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=unix,access=', @ANYRESDEC=0xee01, @ANYBLOB="2c63616368653d667363616368652c00e48c73827769805fc0a2c82e87fd7bde382a5e7a869553c1142adfecbbab4ac8f37ea68a60cfefcf7e105f764c01b99d4f6f94b9be3206c680fe02675fc63965d7a8ebc94d624ab41f81fcc11d17b44df4788d741cd66466578d5e9731c1b99df74d2f0b9854d611d4100e"]) 05:17:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee06257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:16 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) mount$9p_unix(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2000012, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=unix,access=', @ANYRESDEC=0xee01, @ANYBLOB="2c63616368653d667363616368652c00e48c73827769805fc0a2c82e87fd7bde382a5e7a869553c1142adfecbbab4ac8f37ea68a60cfefcf7e105f764c01b99d4f6f94b9be3206c680fe02675fc63965d7a8ebc94d624ab41f81fcc11d17b44df4788d741cd66466578d5e9731c1b99df74d2f0b9854d611d4100e"]) 05:17:16 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000140)='9p\x00', 0x2000012, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=unix,access=', @ANYRESDEC=0xee01, @ANYBLOB="2c63616368653d667363616368652c00e48c73827769805fc0a2c82e87fd7bde382a5e7a869553c1142adfecbbab4ac8f37ea68a60cfefcf7e105f764c01b99d4f6f94b9be3206c680fe02675fc63965d7a8ebc94d624ab41f81fcc11d17b44df4788d741cd66466578d5e9731c1b99df74d2f0b9854d611d4100e"]) 05:17:16 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000140)='9p\x00', 0x2000012, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=unix,access=', @ANYRESDEC=0xee01, @ANYBLOB="2c63616368653d667363616368652c00e48c73827769805fc0a2c82e87fd7bde382a5e7a869553c1142adfecbbab4ac8f37ea68a60cfefcf7e105f764c01b99d4f6f94b9be3206c680fe02675fc63965d7a8ebc94d624ab41f81fcc11d17b44df4788d741cd66466578d5e9731c1b99df74d2f0b9854d611d4100e"]) 05:17:16 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000140)='9p\x00', 0x2000012, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=unix,access=', @ANYRESDEC=0xee01, @ANYBLOB="2c63616368653d667363616368652c00e48c73827769805fc0a2c82e87fd7bde382a5e7a869553c1142adfecbbab4ac8f37ea68a60cfefcf7e105f764c01b99d4f6f94b9be3206c680fe02675fc63965d7a8ebc94d624ab41f81fcc11d17b44df4788d741cd66466578d5e9731c1b99df74d2f0b9854d611d4100e"]) 05:17:16 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1200000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 458.833373][T32135] affs: No valid root block on device loop2 05:17:16 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xa00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:16 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2000012, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=unix,access=', @ANYRESDEC=0xee01, @ANYBLOB="2c63616368653d667363616368652c00e48c73827769805fc0a2c82e87fd7bde382a5e7a869553c1142adfecbbab4ac8f37ea68a60cfefcf7e105f764c01b99d4f6f94b9be3206c680fe02675fc63965d7a8ebc94d624ab41f81fcc11d17b44df4788d741cd66466578d5e9731c1b99df74d2f0b9854d611d4100e"]) [ 458.951141][T32135] affs: No valid root block on device loop2 05:17:16 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x204000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:16 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2000012, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=unix,access=', @ANYRESDEC=0xee01, @ANYBLOB="2c63616368653d667363616368652c00e48c73827769805fc0a2c82e87fd7bde382a5e7a869553c1142adfecbbab4ac8f37ea68a60cfefcf7e105f764c01b99d4f6f94b9be3206c680fe02675fc63965d7a8ebc94d624ab41f81fcc11d17b44df4788d741cd66466578d5e9731c1b99df74d2f0b9854d611d4100e"]) 05:17:16 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x40000000000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:16 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2000012, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=unix,access=', @ANYRESDEC=0xee01, @ANYBLOB="2c63616368653d667363616368652c00e48c73827769805fc0a2c82e87fd7bde382a5e7a869553c1142adfecbbab4ac8f37ea68a60cfefcf7e105f764c01b99d4f6f94b9be3206c680fe02675fc63965d7a8ebc94d624ab41f81fcc11d17b44df4788d741cd66466578d5e9731c1b99df74d2f0b9854d611d4100e"]) [ 459.243877][T32192] affs: No valid root block on device loop2 05:17:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee07257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:16 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=unix,access=', @ANYRESDEC=0xee01, @ANYBLOB="2c63616368653d667363616368652c00e48c73827769805fc0a2c82e87fd7bde382a5e7a869553c1142adfecbbab4ac8f37ea68a60cfefcf7e105f764c01b99d4f6f94b9be3206c680fe02675fc63965d7a8ebc94d624ab41f81fcc11d17b44df4788d741cd66466578d5e9731c1b99df74d2f0b9854d611d4100e"]) 05:17:16 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xb00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:16 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0xe0ffff00000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:16 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, 0x0) [ 459.393849][T32210] 9pnet: p9_fd_create_unix (32210): problem connecting socket: ./file0: -111 05:17:16 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2000000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:16 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, 0x0) 05:17:16 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, 0x0) [ 459.452940][T32215] 9pnet_virtio: no channels available for device ./file0 [ 459.489916][T32217] 9pnet_virtio: no channels available for device ./file0 [ 459.527276][T32219] 9pnet_virtio: no channels available for device ./file0 05:17:17 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x300000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:17 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=unix,access=', @ANYRESDEC=0xee01]) 05:17:17 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=unix,access=']) [ 459.766336][T32233] affs: No valid root block on device loop2 [ 459.798913][T32246] 9pnet: p9_fd_create_unix (32246): problem connecting socket: ./file0: -111 05:17:17 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[]) [ 459.863451][T32250] 9pnet: p9_fd_create_unix (32250): problem connecting socket: ./file0: -111 [ 459.910243][T32255] 9pnet_virtio: no channels available for device ./file0 05:17:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee08257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:17 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[]) 05:17:17 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xc00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:17 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x100000000000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:17 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2010000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:17 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x400000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:17 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[]) [ 460.130475][T32268] 9pnet_virtio: no channels available for device ./file0 05:17:17 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB]) 05:17:17 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2500000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:17 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB]) [ 460.176048][T32276] 9pnet_virtio: no channels available for device ./file0 [ 460.208420][T32278] 9pnet_virtio: no channels available for device ./file0 05:17:17 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB]) [ 460.259639][T32283] 9pnet_virtio: no channels available for device ./file0 05:17:17 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=uni']) [ 460.340760][T32272] affs: No valid root block on device loop2 [ 460.364047][T32294] 9pnet_virtio: no channels available for device ./file0 [ 460.419964][T32307] 9pnet: Could not find request transport: uni 05:17:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02252545e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:17 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=uni']) 05:17:17 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x500000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:17 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x10e000000000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:17 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xd00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:18 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=uni']) 05:17:18 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=unix,acc']) [ 460.609708][T32323] 9pnet: Could not find request transport: uni [ 460.640038][T32327] 9pnet: Could not find request transport: uni 05:17:18 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=unix']) 05:17:18 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3f00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 460.676068][T32331] 9pnet: p9_fd_create_unix (32331): problem connecting socket: ./file0: -111 [ 460.712976][T32325] affs: No valid root block on device loop2 05:17:18 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x200000000000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:18 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=']) [ 460.767112][T32344] 9pnet: p9_fd_create_unix (32344): problem connecting socket: ./file0: -111 05:17:18 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=']) [ 460.820244][T32348] 9pnet_virtio: no channels available for device ./file0 05:17:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02255c45e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:18 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=']) [ 460.875196][T32357] 9pnet_virtio: no channels available for device ./file0 05:17:18 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x600000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:18 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=un']) [ 460.940708][T32362] 9pnet_virtio: no channels available for device ./file0 [ 460.988427][T32365] 9pnet: Could not find request transport: un 05:17:18 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xe00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:18 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=un']) 05:17:18 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=un']) [ 461.153862][T32376] 9pnet: Could not find request transport: un 05:17:18 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=uni']) [ 461.195935][T32355] affs: No valid root block on device loop2 [ 461.198111][T32380] 9pnet: Could not find request transport: un 05:17:18 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:18 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x204000000000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee0225785ee976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:18 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=uni']) 05:17:18 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=uni']) [ 461.349195][T32390] 9pnet: Could not find request transport: uni [ 461.380586][T32394] 9pnet: Could not find request transport: uni [ 461.410488][T32397] 9pnet: Could not find request transport: uni 05:17:18 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x800000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:18 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x604000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:18 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:18 executing program 4: dup(0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000580)={'ip6_vti0\x00', &(0x7f0000000500)={'ip6tnl0\x00', 0x0, 0x29, 0xfc, 0x9, 0xffffffff, 0x12, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8, 0x40, 0x8, 0x80}}) r3 = socket$packet(0x11, 0x3, 0x300) dup(r3) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(r3, r3) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) bind$packet(r3, &(0x7f0000000640)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @link_local}, 0x14) sendmsg$ETHTOOL_MSG_TSINFO_GET(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000600)={&(0x7f0000000bc0)={0x31c, 0x0, 0x200, 0x70bd28, 0x25dfdbfb, {}, [@HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_1\x00'}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}]}, @HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0x31c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000080) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2000012, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=unix,access=', @ANYRESDEC=0xee01, @ANYBLOB="2c63616368653d667363616368652c00e48c73827769805fc0a2c82e87fd7bde382a5e7a869553c1142adfecbbab4ac8f37ea68a60cfefcf7e105f764c01b99d4f6f94b9be3206c680fe02675fc63965d7a8ebc94d624ab41f81fcc11d17b44df4788d741cd66466578d5e9731c1b99df74d2f0b9854d611d4100e"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) 05:17:19 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x80000000, 0x4000) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000140)='NLBL_CIPSOv4\x00') write$binfmt_elf64(r0, &(0x7f0000000880)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0x6, 0x1, 0x81, 0x7000000000000000, 0x2, 0x3, 0x6, 0xd2, 0x40, 0x305, 0x9, 0x3c4c, 0x38, 0x2, 0x4, 0x7, 0x2}, [{0x6474e551, 0x8, 0x8001, 0x4, 0x2, 0x6, 0x1, 0x7fff}, {0x70000000, 0xfff, 0xb2, 0x10001, 0x81, 0xf2b, 0x3, 0x200}], "f0504af0dded045cdb169213f561fdb7e6115eb61f7abcdf406c66a3b74d32a91e938098e1cdd444b216db4225e0bb3f50a22ec811819b17bc77a34daec7cdc7ce676ef8c3a91503f339d6ed6381b4b80c8bc72b848ee654b640baa1866fe1ea0bb5019963829cd5d8f3ede5e3dc5bb3eced193c94ad14379a5fa6a881311dd8482c8fcc7a63b7fed1865bbcdeb7ac776ed5459c3c18adf9ba", [[], [], [], []]}, 0x549) sendmsg$NLBL_CIPSOV4_C_LISTALL(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)={0xcc, r1, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@NLBL_CIPSOV4_A_MLSCATLST={0xa0, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe841}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf4ea}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd3dc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4121ebde}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1be9997}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xcaf5}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6cdb70c}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa42b}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xe52bf9d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x178e}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4ed2}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x502be60}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xd9bfe32}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6a72}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb515}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7e50}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb895}]}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x10, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x52}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}]}, 0xcc}, 0x1, 0x0, 0x0, 0x20000010}, 0x200080d1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_a\xcdl_acce\x05\x00\x00\x00\x00']) [ 461.555261][T32416] 9pnet: p9_fd_create_unix (32416): problem connecting socket: ./file0: -111 05:17:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000080000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 461.605758][T32410] affs: No valid root block on device loop2 05:17:19 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x867c0b89, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:19 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/stat\x00') ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r1, 0xc0385720, &(0x7f0000000100)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socket$nl_rdma(0x10, 0x3, 0x14) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f00000001c0)={0x3, 0xffffffffffffffff, 0x1}) r3 = dup(r2) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000280)={0xcc2e, 0x6, "1a8d7c09b8a977e516cca175322e622caa75931a81bc259b52022eda676a67af", 0x8000, 0x3, 0x400, 0x0, 0x40}) dup(r4) r5 = dup2(r4, r4) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000080)=0x5fb, 0x4) ioctl$ASHMEM_SET_PROT_MASK(r5, 0x40087705, &(0x7f0000000140)={0x4, 0x8}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x7f\xc7?\x02\xach\x03wH\x91t\xb1\xd9\xeaj\"{\tV\x903\xe32\xf4\x89(`\xbd\xa1\\\x84M\x00s\xcd\x1a\xdb\n\x99\x04\x19\xd3'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:19 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x300000000000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:19 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4c000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:19 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x700000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e95ccb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4800000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:19 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:19 executing program 4: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x8cffffff, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:19 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) dup(0xffffffffffffffff) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) r2 = socket$packet(0x11, 0x3, 0x300) dup(r2) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f00000001c0)={0xfffffffffffffffd, 0x18, [], 0x0, &(0x7f0000000140)=[0x0, 0x0, 0x0]}) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(r2, r2) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000100)={@ipv4={[], [], @multicast2}, 0x29, r4}) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000080)={0x18, 0x0, {0x0, @random="36d70e7877c1", 'batadv_slave_1\x00'}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:19 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:19 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) fcntl$getflags(r0, 0x3) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) lsetxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "4d8981625f8ef589af07b912d84198d3000d3ba7"}, 0x15, 0x0) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:19 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) fcntl$getflags(r0, 0x3) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) lsetxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "4d8981625f8ef589af07b912d84198d3000d3ba7"}, 0x15, 0x0) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:19 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) fcntl$getflags(r0, 0x3) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) lsetxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "4d8981625f8ef589af07b912d84198d3000d3ba7"}, 0x15, 0x0) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) [ 462.179993][T32471] affs: No valid root block on device loop2 [ 462.302821][T32471] affs: No valid root block on device loop2 05:17:20 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x400000000000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:20 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) fcntl$getflags(r0, 0x3) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) lsetxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "4d8981625f8ef589af07b912d84198d3000d3ba7"}, 0x15, 0x0) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb88685c2450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:20 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x800000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:20 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4c00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:20 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) fcntl$getflags(r0, 0x3) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) lsetxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "4d8981625f8ef589af07b912d84198d3000d3ba7"}, 0x15, 0x0) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:20 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1100000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:20 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) fcntl$getflags(r0, 0x3) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) lsetxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "4d8981625f8ef589af07b912d84198d3000d3ba7"}, 0x15, 0x0) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f0000000280)) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) [ 462.826715][T32542] affs: No valid root block on device loop2 05:17:20 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4d5f53665248425f, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:20 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) fcntl$getflags(r0, 0x3) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) lsetxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "4d8981625f8ef589af07b912d84198d3000d3ba7"}, 0x15, 0x0) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:20 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x500000000000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:20 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1200000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868620850cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:20 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x900000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:20 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) fcntl$getflags(r0, 0x3) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) lsetxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "4d8981625f8ef589af07b912d84198d3000d3ba7"}, 0x15, 0x0) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:20 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) fcntl$getflags(r0, 0x3) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) lsetxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "4d8981625f8ef589af07b912d84198d3000d3ba7"}, 0x15, 0x0) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:20 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) fcntl$getflags(r0, 0x3) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f0000000280)) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:20 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) fcntl$getflags(r0, 0x3) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f0000000280)) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa034f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:20 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2000000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:20 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x5c00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:20 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xa00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 463.348962][T32577] affs: No valid root block on device loop2 05:17:20 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x600000000000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:20 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) fcntl$getflags(r0, 0x3) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f0000000280)) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:20 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) fcntl$getflags(r0, 0x3) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000280)) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:20 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) fcntl$getflags(r0, 0x3) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000280)) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:21 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) fcntl$getflags(r0, 0x3) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000280)) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:21 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) fcntl$getflags(r0, 0x3) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000280)) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:21 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xb00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 463.635809][T32637] affs: No valid root block on device loop2 05:17:21 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) fcntl$getflags(r0, 0x3) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000280)) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) [ 463.763198][T32637] affs: No valid root block on device loop2 05:17:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa044f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:21 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2010000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:21 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) fcntl$getflags(r0, 0x3) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000280)) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:21 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x604000000000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:21 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x5f42485266535f4d, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:21 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) fcntl$getflags(r0, 0x3) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f0000000280)) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) [ 464.116375][T32688] affs: No valid root block on device loop2 05:17:21 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x700000000000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:21 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) fcntl$getflags(r0, 0x3) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f0000000280)) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:21 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) fcntl$getflags(r0, 0x3) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f0000000280)) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:21 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000280)) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:21 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xc00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:21 executing program 4: execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000280)) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa054f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 464.433943][T32725] affs: No valid root block on device loop2 05:17:22 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2500000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:22 executing program 4: execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000280)) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:22 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x800000000000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:22 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6800000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:22 executing program 4: execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000280)) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:22 executing program 4: open(0x0, 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000280)) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:22 executing program 4: open(0x0, 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000280)) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:22 executing program 4: open(0x0, 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000280)) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa064f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:22 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xd00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 464.889248][T32758] affs: No valid root block on device loop2 05:17:22 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x0, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000280)) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:22 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x900000000000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:22 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3f00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:22 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x0, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000280)) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa074f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 465.174496][ T328] affs: No valid root block on device loop2 05:17:22 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6c00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:22 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x0, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000280)) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:22 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:22 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000280)) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) [ 465.334750][ T328] affs: No valid root block on device loop2 05:17:22 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000280)) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:22 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000280)) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:22 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xe00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:22 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000280)) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:22 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0xa00000000000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa084f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:23 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000280)) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:23 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000280)) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) [ 465.713425][ T380] affs: No valid root block on device loop2 05:17:23 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7400000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:23 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x0, 0x300) r1 = dup(r0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000280)) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:23 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000080000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa025e85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:23 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0xb00000000000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:23 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:23 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x0, 0x300) r1 = dup(r0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000280)) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:23 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0xc00000000000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:23 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x0, 0x300) r1 = dup(r0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000280)) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:23 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = dup(0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000280)) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49002464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:23 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:23 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7a00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:23 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4800000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:23 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = dup(0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000280)) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:23 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = dup(0xffffffffffffffff) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000280)) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:23 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) dup(r0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000280)) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:23 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) dup(r0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000280)) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:23 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) dup(r0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000280)) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) [ 466.290964][ T438] affs: No valid root block on device loop2 [ 466.438359][ T438] affs: No valid root block on device loop2 05:17:23 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0xd00000000000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:23 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:23 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x890b7c8600000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:23 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1100000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49003464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:23 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4c00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:24 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8cffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:24 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49004464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:24 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) execve(0x0, &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:24 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) execve(0x0, &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:24 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) execve(0x0, &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:24 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) execve(&(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:24 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0xe00000000000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:24 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) execve(&(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:24 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1200000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:24 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x5c00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:24 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) execve(&(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:24 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x97ffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 467.027119][ T544] affs: No valid root block on device loop2 05:17:24 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840), &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) [ 467.263440][ T544] affs: No valid root block on device loop2 05:17:24 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49005464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:24 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840), &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:24 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0xf00000000000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:24 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840), &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:24 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[0x0], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:24 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[0x0], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:25 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x1000000000000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) [ 467.566885][ T611] affs: No valid root block on device loop2 05:17:25 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2000000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:25 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6800000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:25 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:25 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[0x0], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49006464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:25 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, 0x0) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], 0x0) 05:17:25 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) dup(r0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000280)) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:25 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) fcntl$getflags(r0, 0x3) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) lsetxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "4d8981625f8ef589af07b912d84198d3000d3ba7"}, 0x15, 0x0) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:25 executing program 4: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) fcntl$getflags(r0, 0x3) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) lsetxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "4d8981625f8ef589af07b912d84198d3000d3ba7"}, 0x15, 0x0) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f0000000280)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:25 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) [ 467.933698][ T619] affs: No valid root block on device loop2 05:17:25 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x1100000000000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:25 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf9fdffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:25 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2010000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:25 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6c00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:25 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49007464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:25 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:25 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:25 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) [ 468.294395][ T679] affs: No valid root block on device loop2 05:17:25 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:25 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:25 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7400000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 468.602666][ T679] affs: No valid root block on device loop2 05:17:26 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x1200000000000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:26 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:26 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2500000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfdfdffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49008464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:26 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7a00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:26 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:26 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:26 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:26 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3f00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfdffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:26 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) [ 469.044013][ T753] affs: No valid root block on device loop2 05:17:26 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x1713000000000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f4900a464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:26 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7fffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:26 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:26 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x890b7c8600000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:26 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:26 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:26 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xff0f000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:26 executing program 4: execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:26 executing program 4: execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:26 executing program 4: execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) [ 469.522910][ T826] affs: No valid root block on device loop2 05:17:27 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x2000000000000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:27 executing program 4: open(0x0, 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:27 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f4900b464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:27 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8cffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 469.695215][ T826] affs: No valid root block on device loop2 05:17:27 executing program 4: open(0x0, 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:27 executing program 4: open(0x0, 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:27 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x0, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:27 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000080000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:27 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffefffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:27 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x0, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:27 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f4900c464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:27 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x2010000000000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:27 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x0, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:27 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:27 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) [ 470.117826][ T903] affs: No valid root block on device loop2 05:17:27 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x97ffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:27 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x2500000000000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:27 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:27 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f4900d464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:27 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4100000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:27 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:27 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:27 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:27 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:27 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:27 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) [ 470.497834][ T923] affs: No valid root block on device loop2 05:17:28 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:28 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) [ 470.814111][ T923] affs: No valid root block on device loop2 05:17:28 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x3f00000000000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:28 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:28 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4800000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:28 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f4900e464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:28 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf9fdffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:28 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:28 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) [ 471.241292][ T1007] affs: No valid root block on device loop2 05:17:28 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:28 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:28 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4c00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 471.402587][ T1007] affs: No valid root block on device loop2 05:17:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfbffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49010464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:28 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:28 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x4000000000000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:28 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:29 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) [ 471.563565][ T1058] affs: No valid root block on device loop2 05:17:29 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:29 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4d5f53665248425f, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:29 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:29 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) [ 471.740631][ T1058] affs: No valid root block on device loop2 05:17:29 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49011464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:29 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfdfdffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:29 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(0x0, &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:29 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x4800000000000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:29 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49012464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:29 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x5c00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:29 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(0x0, &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:29 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(0x0, &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) [ 472.203844][ T1123] affs: No valid root block on device loop2 05:17:29 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:29 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x5f42485266535f4d, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:29 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:29 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x4900000000000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:29 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfdffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:29 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009465e95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:29 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', 0x0, &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:29 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840), &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:30 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x4c00000000000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) [ 472.582794][ T1175] affs: No valid root block on device loop2 05:17:30 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6800000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:30 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:30 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840), &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:30 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840), &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:30 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[0x0], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95027a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 472.814036][ T1202] affs: No valid root block on device loop2 [ 472.946918][ T1202] affs: No valid root block on device loop2 05:17:30 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xff0f000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:30 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[0x0], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:30 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[0x0], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:30 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:17:30 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x5c00000000000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:30 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:30 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6c00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95037a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:30 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:30 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffefffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:30 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:30 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:30 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:30 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f4900a464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 473.449961][ T1272] affs: No valid root block on device loop2 05:17:30 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:30 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7400000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:31 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x6000000000000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:31 executing program 4: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x1200000000000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95057a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:31 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:31 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7a00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:31 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x442000, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) dup(r0) r1 = dup2(r0, r0) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) [ 473.883326][ T1330] affs: No valid root block on device loop2 05:17:31 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x442000, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) dup(r0) r1 = dup2(r0, r0) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) 05:17:31 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x442000, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) dup(r0) r1 = dup2(r0, r0) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) 05:17:31 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x442000, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) dup(r0) r1 = dup2(r0, r0) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) dup(r1) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) [ 474.003674][ T1330] affs: No valid root block on device loop2 05:17:31 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x442000, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) dup(r0) r1 = dup2(r0, r0) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) dup(r1) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) 05:17:31 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x6800000000000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x890b7c8600000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95067a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:31 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffff0700, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:31 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x442000, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) dup(r0) r1 = dup2(r0, r0) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) dup(r1) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) 05:17:31 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x442000, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) dup(r0) r1 = dup2(r0, r0) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) 05:17:31 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x442000, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) dup(r0) r1 = dup2(r0, r0) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) [ 474.327101][ T1378] affs: No valid root block on device loop2 05:17:31 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x442000, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) dup(r0) r1 = dup2(r0, r0) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) 05:17:31 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x442000, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) dup(r0) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) 05:17:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8cffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:31 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x442000, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) dup(r0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) 05:17:32 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x6c00000000000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:32 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x442000, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) dup(r0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) 05:17:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95077a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 474.559727][ T1378] affs: No valid root block on device loop2 05:17:32 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x64, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:32 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x442000, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) dup(r0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) 05:17:32 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffffff7f, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:32 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x442000, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) 05:17:32 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x442000, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) 05:17:32 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x97ffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:32 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x442000, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) 05:17:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95087a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:32 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x442000, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) [ 474.943474][ T1448] affs: No valid root block on device loop2 05:17:32 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x7400000000000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:32 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) 05:17:32 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x300, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:32 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) 05:17:32 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) 05:17:32 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:32 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x442000, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) [ 475.233523][ T1492] affs: No valid root block on device loop2 05:17:32 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x442000, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) 05:17:32 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:32 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x442000, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) 05:17:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95097a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:32 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x442000, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) 05:17:32 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x7a00000000000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:32 executing program 4: openat$bsg(0xffffffffffffff9c, 0x0, 0x442000, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) 05:17:33 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3700, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:33 executing program 4: openat$bsg(0xffffffffffffff9c, 0x0, 0x442000, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) [ 475.739360][ T1538] affs: No valid root block on device loop2 05:17:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf9fdffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:33 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:33 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x7fffffffffffffff, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a950a7a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:33 executing program 4: openat$bsg(0xffffffffffffff9c, 0x0, 0x442000, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) 05:17:33 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) 05:17:33 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x0, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) 05:17:33 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x0, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) [ 475.988338][ T1573] affs: No valid root block on device loop2 05:17:33 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x0, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) 05:17:33 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(0xffffffffffffffff, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) [ 476.148251][ T1573] affs: No valid root block on device loop2 05:17:33 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7ffffff9, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a950b7a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfdfdffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:33 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:33 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(0xffffffffffffffff, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) 05:17:33 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x8cffffff00000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:33 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(0xffffffffffffffff, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) 05:17:33 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, 0xffffffffffffffff) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) 05:17:33 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, 0xffffffffffffffff) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) 05:17:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a950c7a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfdffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 476.533283][ T1623] affs: No valid root block on device loop2 05:17:34 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, 0xffffffffffffffff) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) [ 476.661662][ T1623] affs: No valid root block on device loop2 05:17:34 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffff888030390b98, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:34 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) dup2(r0, r0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) 05:17:34 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:34 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0xf6ffffff00000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xff0f000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a950d7a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:34 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:34 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) dup2(r0, r0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) 05:17:34 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) dup2(r0, r0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) [ 477.399413][ T1686] affs: No valid root block on device loop2 05:17:34 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) 05:17:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffefffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:34 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) [ 477.622965][ T1686] affs: No valid root block on device loop2 05:17:35 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffff8881077d4598, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:35 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) 05:17:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a950e7a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:35 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:35 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:35 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0xf9fdffff00000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:35 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) 05:17:35 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) 05:17:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95107a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 478.399980][ T1742] affs: No valid root block on device loop2 05:17:35 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:35 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:35 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) [ 478.552496][ T1742] affs: No valid root block on device loop2 05:17:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:36 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0xfbffffff00000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:36 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(0x0, &(0x7f0000000040), &(0x7f00000005c0)) 05:17:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95117a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:36 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:36 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(0x0, &(0x7f0000000040), &(0x7f00000005c0)) [ 479.301761][ T1800] affs: No valid root block on device loop2 05:17:36 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(0x0, &(0x7f0000000040), &(0x7f00000005c0)) 05:17:36 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:36 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0xfdfdffff00000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) [ 479.418499][ T1800] affs: No valid root block on device loop2 05:17:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95127a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 479.744669][ T1828] affs: No valid root block on device loop2 05:17:37 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2fdfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:37 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', 0x0, &(0x7f00000005c0)) 05:17:37 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x64, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:37 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0xff0f000000000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95045c7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:37 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:37 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x300, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 480.327390][ T1862] affs: No valid root block on device loop2 05:17:37 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', 0x0, &(0x7f00000005c0)) 05:17:37 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', 0x0, &(0x7f00000005c0)) 05:17:37 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:37 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x0, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) 05:17:37 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x442000, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) [ 480.524674][ T1862] affs: No valid root block on device loop2 05:17:38 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be5cdfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:38 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x442000, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) 05:17:38 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0xffefffff00000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:38 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c087e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:38 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x442000, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) dup(r0) r1 = dup2(r0, r0) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) dup(r1) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), &(0x7f00000005c0)) 05:17:38 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x9200, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:38 executing program 4: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0xd000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x11000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:38 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\xff']) [ 481.015819][ T1918] affs: No valid root block on device loop2 05:17:38 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0xfff7ffff00000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:38 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:38 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be5edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:38 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:38 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e020001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 481.282422][ T1966] affs: No valid root block on device loop2 05:17:38 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\xff']) 05:17:38 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0xfffbffff00000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) [ 481.508653][ T1993] affs: No valid root block on device loop2 [ 481.552363][ T1956] BTRFS: device fsid 00000000-0000-0000-9504-7a7b7f5c247e devid 0 transid 0 /dev/loop5 scanned by syz-executor.5 (1956) 05:17:39 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7ffffff9, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:39 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:39 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0xfffdffff00000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:39 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd582489aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e030001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xa000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:39 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:39 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) [ 481.905357][ T2012] affs: No valid root block on device loop2 05:17:39 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:39 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) [ 482.075184][ T2012] affs: No valid root block on device loop2 05:17:40 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0xffffff7f00000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:40 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffff888023615398, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:40 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd582689aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:40 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e040001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:40 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xd000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:40 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:40 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) [ 483.005057][ T2094] affs: No valid root block on device loop2 05:17:40 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0xffffffff00000000, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:40 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e050001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:40 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:40 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5826c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 483.384415][ T2131] affs: No valid root block on device loop2 [ 483.535244][ T2131] affs: No valid root block on device loop2 05:17:41 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffff8880238e7c98, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:41 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:41 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd582749aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:41 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x64, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e060001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:41 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffff0700, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) [ 483.920380][ T2172] affs: No valid root block on device loop2 05:17:41 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1100, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:41 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:41 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5827a9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e070001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 484.118164][ T2172] affs: No valid root block on device loop2 05:17:41 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x300, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:41 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\x00']) 05:17:42 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:42 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffff7f, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:42 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:42 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9a0e02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e080001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:42 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xee00, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:42 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4800, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 484.938785][ T2262] affs: No valid root block on device loop2 05:17:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e090001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:42 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x5c00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:42 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9a0f02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 485.089457][ T2262] affs: No valid root block on device loop2 05:17:42 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&[\\']) 05:17:42 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) [ 485.287156][ T2300] affs: No valid root block on device loop2 [ 485.492870][ T2300] affs: No valid root block on device loop2 05:17:43 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2fdfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:43 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_access&=\x00']) 05:17:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e0a0001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:43 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee03257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:43 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:43 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7ffffff9, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e0b0001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:43 executing program 4: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x4800, 0x1, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) [ 485.965943][ T2333] affs: No valid root block on device loop2 [ 486.051939][ T2339] BTRFS: device fsid 024f85f4-9009-464a-9504-7a7b7f5c247e devid 0 transid 0 /dev/loop5 scanned by syz-executor.5 (2339) 05:17:43 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee04257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:43 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:43 executing program 4: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:43 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_accesz&[\x00']) 05:17:43 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be5cdfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:43 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_accesc&[\x00']) 05:17:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e0c0001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 486.314508][ T2368] affs: No valid root block on device loop2 05:17:43 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee05257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:43 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_acces#&[\x00']) [ 486.523753][ T2368] affs: No valid root block on device loop2 05:17:44 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffff888023a1d718, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:44 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_acceds&[\x00']) 05:17:44 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:44 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee06257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e0d0001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:44 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd582489aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:44 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_acl_acce\bs&[\x00']) 05:17:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xd00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e0e0001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 487.034386][ T2424] affs: No valid root block on device loop2 05:17:44 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee07257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e0f0001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:44 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_ac0_access&[\x00']) 05:17:45 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffff8880325d9318, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:45 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:45 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_ac-_access&[\x00']) 05:17:45 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd582689aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:45 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee08257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e100001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:45 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5826c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 487.993695][ T2480] affs: No valid root block on device loop2 05:17:45 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02252545e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e110001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:45 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x8, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:45 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposix_ac-_access&[\x00']) 05:17:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x300, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 488.364402][ T2511] affs: No valid root block on device loop2 [ 488.597750][ T2511] affs: No valid root block on device loop2 05:17:46 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:46 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfposih_acl_access&[\x00']) 05:17:46 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257809e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e120001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:46 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd582749aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:46 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xb, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:46 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5826c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:46 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e110001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 489.025724][ T2555] affs: No valid root block on device loop2 05:17:46 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfpotix_acl_access&[\x00']) 05:17:46 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257825e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:46 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5827a9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e250001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 489.163679][ T2555] affs: No valid root block on device loop2 05:17:47 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xf, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:47 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="5cb281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:47 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfpo+ix_acl_access&[\x00']) 05:17:47 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9a0e02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:47 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee0225785ee976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e5c0001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:47 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfpxsix_acl_access&[\x00']) [ 490.011142][ T2622] affs: No valid root block on device loop2 05:17:47 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x14, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:47 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9a0f02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:47 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2fdfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:47 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e95ccb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e040201", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:47 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfpLsix_acl_access&[\x00']) 05:17:47 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='selfpLsix_acl_access&[\x00']) 05:17:47 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='sel.posix_acl_access&[\x00']) 05:17:47 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='sezfposix_acl_access&[\x00']) [ 490.276090][ T2652] affs: No valid root block on device loop2 05:17:47 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='(\xe0\xf5\x00\xac'], &(0x7f00000005c0)=[&(0x7f0000000040)='seHfposix_acl_access&[\x00']) 05:17:47 executing program 4 (fault-call:5 fault-nth:0): openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:47 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x25, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:47 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:48 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee03257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:48 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be5cdfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:48 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000301", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:48 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868252450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:48 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x18002, 0x0) ioctl$CAPI_CLR_FLAGS(r2, 0x80044325, &(0x7f0000000080)=0x1) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) [ 490.817550][ T2709] affs: No valid root block on device loop2 05:17:48 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r1 = openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000140)='/proc/asound/card3/oss_mixer\x00', 0x0, 0x0) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r1, 0x80286722, &(0x7f00000001c0)={&(0x7f0000000180)=""/6, 0x6, 0x80000001, 0x1}) r2 = socket$packet(0x11, 0x3, 0x300) r3 = dup2(r2, r2) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) syz_io_uring_complete(0x0) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000100)=0x200) ioctl$KVM_SET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, &(0x7f0000000080)={0x0, 0x0, 0x3, &(0x7f0000000000)=0xffffffffffffa41c}) 05:17:48 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) dup(r0) r1 = dup2(r0, r0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x82000, 0x0) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) write$9p(r1, &(0x7f0000000100)="c878d6519dc44962ffecfec96c175b1822d414137a9ba46f8122d62f7c6bb3de6a842906144712f3691bddfa5a2a873847954c79e943e9513a07a14d251ba0a0793109ba9619c7ff335011bbbaf9aa8970c53f88ed846e4c9465219cbfd165f9f5dc9095744acc8d1037b4e63d5c9227cc371d77d5649f4e8b69d91d43b228e0615fc5b41f2435294dfd54b7a2f89d7c5cc19dea66", 0x95) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) dup2(r3, r3) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'bond0\x00'}) socket$nl_crypto(0x10, 0x3, 0x15) r5 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:48 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 05:17:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e020401", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 490.989972][ T2709] affs: No valid root block on device loop2 05:17:48 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4a, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:48 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb88685c2450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:48 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee04257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:48 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd582489aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:48 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) r2 = socket$packet(0x11, 0x3, 0x300) dup(r2) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(r2, r2) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) r5 = socket$packet(0x11, 0x3, 0x300) dup(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(r5, r5) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) bind$packet(r5, &(0x7f0000000640)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @link_local}, 0x14) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="20020000", @ANYRES16=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="140002007767300000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="6000018014000200626f6e645f736c6176655f30000000000800030002000000080003000600000014000200626f6e645f736c6176655f3000000000080003000300000008000100", @ANYRES32=0x0, @ANYBLOB="1400020076657468305f746f5f626f6e640000003000018008000100", @ANYRES32=r4, @ANYBLOB="08000300030000000800030002000000140002006c6f00000000000000000000000000005000018008000100", @ANYRES32=r7, @ANYBLOB="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"], 0x220}, 0x1, 0x0, 0x0, 0x20000000}, 0x800) r8 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0xd9) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000080)=[&(0x7f0000000100)='/dev/bsg\x00'], 0x0) 05:17:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e060401", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:48 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868620850cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 491.376666][ T2769] affs: No valid root block on device loop2 05:17:48 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000007f80)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f000001d0c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x14, r3, 0x709, 0x0, 0x0, {{}, {@void, @void, @void}}}, 0x14}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000240)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_STOP_NAN(r2, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000008}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, r3, 0x2, 0x70bd29, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x10001, 0x48}}}}, ["", "", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0xc894) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000007f80)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f000001d0c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="14000000", @ANYRES16=r5, @ANYBLOB="3cfd0523"], 0x14}}, 0x0) sendmsg$NL80211_CMD_UPDATE_OWE_INFO(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="ea26264f", @ANYRES16=r5, @ANYBLOB="00022bbd7000fddbdf25870000000a000600ffffffffffff00000a00060008021100000000000a00060008021100000000000600480003000000"], 0x40}}, 0x40000) r6 = socket$packet(0x11, 0x3, 0x300) r7 = dup2(r6, r6) r8 = dup(r6) setsockopt$IP_VS_SO_SET_EDIT(r8, 0x0, 0x483, &(0x7f0000000100)={0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e23, 0x4, 'rr\x00', 0x34, 0xb1d3, 0x32}, 0x2c) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r7, 0x10f, 0x84, &(0x7f0000000000), &(0x7f0000000080)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:48 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) preadv(r0, &(0x7f0000001600)=[{&(0x7f0000000100)=""/245, 0xf5}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/82, 0x52}, {&(0x7f0000001280)=""/207, 0xcf}, {&(0x7f0000001380)=""/242, 0xf2}, {&(0x7f0000001480)=""/120, 0x78}, {&(0x7f0000000000)=""/54, 0x36}, {&(0x7f0000001500)=""/207, 0xcf}], 0x8, 0x0, 0x3) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:48 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = dup(r2) setsockopt$packet_int(r3, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) sendmsg$TIPC_CMD_GET_MAX_PORTS(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x40000) r4 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000501", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:48 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) r3 = dup(r2) r4 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/timer\x00', 0x10000) r5 = openat(r2, &(0x7f0000000080)='./file1\x00', 0x604f82, 0xb) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000200)={'bond0\x00'}) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x48442, 0x0) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f0000000300)=ANY=[@ANYBLOB="240000000000000002000000000000000a00000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\t\x00'/28, @ANYRES32=r5, @ANYBLOB="000000000400"/28, @ANYRES32=r2, @ANYBLOB="0000000031caffffffff00000100000000000000000000d99e", @ANYRES32=r6, @ANYBLOB="00000000ff7f00"/28, @ANYRES32=r0, @ANYBLOB="000000000000000000000000000000000039f1baab2c4729bbaff2d6e33449dc28267e545ca5f54d9c0a9dcaf746b34226c7acbd7b15f61cd48504030078b368bba35d7b75204b38dce323c31c6a2e0a58eba1413843b765caaffc2d1868e9a517c64f7f367e0e3be5a9489d8471dedd2264398b9151d67c5e9f5e", @ANYRES32=r0, @ANYBLOB='\x00'/28, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r7, @ANYBLOB="80feff000000000001000000000000000346775512f1210d5e3c1000", @ANYRES32, @ANYBLOB="00000000ffff00"/28, @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28]) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:49 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x68, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:49 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f0000000000)=@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}) r2 = dup2(r1, r1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:49 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee05257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 491.774927][ T2823] affs: No valid root block on device loop2 05:17:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd582689aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:49 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, 0x0) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/udp6\x00') openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = dup2(r2, r2) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000100)={0x2, 0x2, 0x41af}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:49 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x69, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:49 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) dup(r3) r4 = dup2(r3, r3) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) syncfs(r4) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:49 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb886862c050cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:49 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee06257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000601", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:49 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) r4 = dup(r3) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$SNDRV_TIMER_IOCTL_TREAD(r4, 0x40045402, &(0x7f0000000000)=0x1) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:49 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x3) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:49 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x4001, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:49 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$BTRFS_IOC_FS_INFO(0xffffffffffffffff, 0x8400941f, &(0x7f0000000480)) r3 = dup(r2) r4 = dup2(r2, r2) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) r5 = socket$packet(0x11, 0x3, 0x300) dup(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(r5, r5) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) bind$packet(r5, &(0x7f0000000640)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @link_local}, 0x14) r8 = syz_mount_image$hfsplus(&(0x7f00000003c0)='hfsplus\x00', &(0x7f0000000240)='./file1\x00', 0xfffffffffffffff8, 0x2, &(0x7f0000000380)=[{&(0x7f0000000280)="cd420ba915a770a7dc5d23f548149b64f1ccfc124663f3b4e6e03151111a822019d6880df7d6c3d70bb7141fa83ed225eeb7baa2", 0x34, 0xf5}, {&(0x7f0000000940)="3996fde2741c19bd41690ba760325c08f60a0ba26532c1331c80256e6c4f474b490e0731a84a6c54337d3b08a58b049dcb66f5585035c29cb91b88b3c527a8ec86e4d60164c2ee123f88b4b107191c4ef4a0b5b0eb693478b120eb26f2ff3d9287772568692df75107148c3c0de4a8c6bb9dac15ac757fa0e47ac889477996637e20b849cad8fbc8fe0f153660213825c37a7b7fd4496e5855c05eb3ffee9a1971f3631857d3bfe79cb5f0446780", 0xae, 0x400}], 0x230048, &(0x7f0000000880)=ANY=[@ANYBLOB="706172743d3078303030303030303030303030303066662c747970653d79446c072c7375626a5f747970653d717565756530002c736d61636b66736465663d2f6465762f627367002c657569643ede0000", @ANYRES64=r3, @ANYBLOB=',obj_role=queue0\x00,func=KEXEC_KERNEL_CHECK,euid<', @ANYRESDEC=r5, @ANYBLOB=',mask=^MAY_WRITE,\x00']) ioctl$FICLONE(r2, 0x40049409, r8) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r4, 0xc08c5334, &(0x7f0000000100)={0x3, 0xfffffffc, 0x1, 'queue0\x00', 0xed6b}) r9 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)=[&(0x7f0000000000)='queue0\x00'], 0x0) 05:17:49 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) dup(r3) r4 = dup2(r3, r3) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) r5 = socket$packet(0x11, 0x3, 0x300) dup(r5) r6 = dup2(r5, r5) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) getsockname$unix(r6, &(0x7f0000000180)=@abs, &(0x7f0000000200)=0x6e) accept$ax25(r4, &(0x7f0000000240)={{0x3, @default}, [@rose, @rose, @netrom, @null, @remote, @default, @remote, @bcast]}, &(0x7f0000000000)=0x48) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) [ 492.318932][ T2854] affs: No valid root block on device loop2 05:17:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5826c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:49 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:49 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xd2, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:49 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) dup(r1) r2 = socket$packet(0x11, 0x3, 0x300) r3 = dup(r2) setsockopt$packet_int(r3, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) [ 492.495106][ T2854] affs: No valid root block on device loop2 05:17:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e040601", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:50 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee07257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:50 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000540)=@bpf_lsm={0x1d, 0x10, &(0x7f00000000c0)=@framed={{}, [@exit, @map, @map_val, @call, @generic, @btf_id, @map_val={0x18, 0x0, 0x2, 0x0, 0x1}, @btf_id]}, &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = dup2(r1, r1) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f0000000140)) write$P9_RWSTAT(r0, &(0x7f0000000000)={0x7, 0x7f, 0x2}, 0x7) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$packet(0x11, 0x3, 0x300) dup(r4) r5 = dup2(r4, r4) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f0000000080)={0x0, 0x3}, 0x8) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:50 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622425cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:50 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) r3 = socket$packet(0x11, 0x3, 0x300) dup(r3) r4 = dup2(r3, r3) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) fcntl$F_SET_FILE_RW_HINT(r4, 0x40e, &(0x7f0000000180)=0x5) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x6, 0x5, 0x2, 0xa1d, 0x48, @private0, @ipv4={[], [], @private=0xa010100}, 0x8, 0x10, 0x9, 0x7f}}) bind$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x3, r5}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) r6 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x200, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r6, &(0x7f0000000240)={0x12, 0x10, 0xfa00, {&(0x7f0000000200), 0xffffffffffffffff, r1}}, 0x18) 05:17:50 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) ioctl$USBDEVFS_SETINTERFACE(r0, 0x80085504, &(0x7f0000000000)={0x3f, 0xb2a7}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = dup2(r1, r1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fcntl$setown(r0, 0x8, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:50 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) dup(r2) r3 = socket$packet(0x11, 0x3, 0x300) dup(r3) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(r3, r3) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'bond0\x00'}) bind$packet(r3, &(0x7f0000000640)={0x11, 0x41e4b89847cceae6, 0x0, 0x1, 0x0, 0x6, @dev={[], 0xd}}, 0x14) sendto$inet6(r4, &(0x7f0000000300)="0503d03206023e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d8883143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfffffddc, 0xc800000004008808, 0x0, 0x4d) pread64(r3, &(0x7f0000000180)=""/60, 0x3c, 0x7) r5 = socket$packet(0x11, 0x3, 0x300) dup(r5) r6 = dup2(r5, r5) setsockopt$packet_int(r0, 0x107, 0x8, &(0x7f0000000080)=0x2, 0x4) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x8, 0x8d, 0x4, 0x0, 0x0, 0x3, 0x4806, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1d, 0x2, @perf_bp={&(0x7f0000000000), 0x2}, 0x2414, 0x4, 0x0, 0x2, 0x81, 0x2, 0x6}, 0x0, 0x9, r6, 0xa) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400203) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000240)={'filter\x00', 0x4}, 0x68) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:50 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) dup2(r0, r0) r1 = socket$packet(0x11, 0x3, 0x300) dup(r1) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(r1, r1) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'bond0\x00'}) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503d03206023e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0xc800000000000000, 0x0, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = dup(r3) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x20200, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x2, 0x0) socket$packet(0x11, 0x3, 0x300) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) execve(&(0x7f0000000100)='./file1/file0\x00', &(0x7f0000000180)=[&(0x7f00000001c0)='\b'], 0x0) 05:17:50 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd582749aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:50 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfef24901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 492.872809][ T2914] affs: No valid root block on device loop2 05:17:50 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x300, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:50 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x400, 0x0) ioctl$HDIO_GETGEO(r3, 0x301, &(0x7f0000000080)) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000701", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:50 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee08257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:50 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5827a9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 493.196286][ T2914] affs: No valid root block on device loop2 05:17:50 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:50 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) r4 = dup(r3) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x48, 0x0, 0x300, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x400}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010101}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x7}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}]}, 0x48}, 0x1, 0x0, 0x0, 0x1}, 0x0) mmap$snddsp_control(&(0x7f0000ffb000/0x4000)=nil, 0x1000, 0x2000007, 0xac9003f886cfce9a, r4, 0x83000000) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:50 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) dup(r0) r1 = dup2(r0, r0) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x301, 0x0, 0x0, {0xc}, [@CTA_STATUS={0x8, 0x3, 0x1, 0x0, 0x1402}, @CTA_ID={0x8, 0xc, 0x1, 0x0, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x40010}, 0x14) r2 = socket$packet(0x11, 0x3, 0x300) r3 = dup2(r2, r2) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) setpgid(0x0, 0x0) 05:17:50 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) r3 = socket$packet(0x11, 0x3, 0x300) dup(r3) r4 = dup2(r3, r3) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) getsockopt$ax25_int(r4, 0x101, 0x2, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:17:50 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9a0e02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:50 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)=[&(0x7f0000000000)='\x00', &(0x7f0000000080)='.k$#\x00', &(0x7f0000000100)='/dev/bsg\x00', &(0x7f0000000180)='/dev/bs\x02\xf3'], 0x0) 05:17:50 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfef9f901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:51 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3a5, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000901", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:51 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = dup2(r0, r0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) r5 = getpid() sched_setscheduler(r5, 0x5, 0x0) sendmsg$AUDIT_SET(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x34210000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x38, 0x3e9, 0x200, 0x70bd2a, 0x25dfdbff, {0x20, 0x1, 0x0, r5, 0x7, 0x6, 0x1, 0x1, 0x0, 0x1f}, ["", "", "", "", "", "", ""]}, 0x95}, 0x1, 0x0, 0x0, 0xc0}, 0x0) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03206023e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0xc800000000000000, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r6 = dup(r1) setsockopt$packet_int(r6, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r6, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r7 = dup2(r6, r0) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) [ 493.604239][ T2985] affs: No valid root block on device loop2 05:17:51 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee025e7845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:51 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) open(&(0x7f0000000000)='./file1\x00', 0x200, 0x2) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:51 executing program 4: ioctl$vim2m_VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, &(0x7f0000000100)={0x8000, 0x3032344d, 0x2, @discrete={0x2, 0x7f}}) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) dup(r1) r2 = socket$packet(0x11, 0x3, 0x300) r3 = dup(r2) setsockopt$packet_int(r3, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$PPPIOCNEWUNIT(r3, 0xc004743e, &(0x7f0000000080)) socket$nl_route(0x10, 0x3, 0x0) ioctl$SNDRV_PCM_IOCTL_USER_PVERSION(0xffffffffffffffff, 0x40044104, &(0x7f0000000000)=0x5) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000300)=[&(0x7f0000000140)='/dev/bsg\x00', &(0x7f0000000180)='/dev/bsg\x00', &(0x7f00000001c0)='#\x00', &(0x7f0000000200)='/dev/bsg\x00', &(0x7f0000000240)='!\x00', &(0x7f0000000280)='\x00', &(0x7f00000002c0)='/dev/bsg\x00'], 0x0) 05:17:51 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000080)) fcntl$dupfd(r0, 0x406, r0) write$rfkill(r0, &(0x7f0000000000)={0x1f, 0x4, 0x3, 0x1}, 0x8) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) r4 = syz_mount_image$hfsplus(&(0x7f00000001c0)='hfsplus\x00', &(0x7f0000000200)='./file1\x00', 0xc227, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000240)="84d948a426a10a208057fa44bc18a9909fc8d0", 0x13, 0xdc}, {&(0x7f0000000280)="43204cae18205651afa903a0ef87d1dd68741e7d619be0e6b934eda4065bac0c4f0d5fffbbe9dbbc7da7234e457c8a363d2e7e8be078c659da176426490bf15e603eae4e", 0x44, 0x1}, {&(0x7f0000000300)="571fbbe3a3e68458cce8b9627449227c2c67813e8b1140dd309f311967c28fbd1a205aa11a931aaeb045e9717c9e02d3e2a59a00a29b9d4d7e9327dc795e5d116587e4a51884780357e17dd05b2778ced7f2f0b7895b08c169b4dd9f6fb444d139973fef5994be37104db969f2c04622cf4cae012827072bd0c20c606b980583f44f028b71c5ed143995cd873e57b332932b167d7773458d2680efc15506660a53d849a4022460df933e70e1f77746bd0ae3d1efcc4b544c9ca6523c75a6c822", 0xc0, 0x72}], 0x802000, &(0x7f00000014c0)=ANY=[@ANYBLOB="632c09314e6f723d6777d2c72c61707072616973652c7375626a5f726f6c653d2f4465762f7e0300002c00fa31ce60217eadb9a65b220a6c18d8c4a03add6c99823afe20130076fbc135ee18cb903d6c37e0b52286f1bd64830a515ec7ca8e317abf275e5c616027ad0244af04ee41446798aa961d9fcb8471d28b45945d260a6d6b95cded1dcb346183fc0bfb946ea0eb3d903f6a003f23ded0bd090a0297bae0ab89f798dff90fd45fab0119dbec91443bfd2b79"]) ioctl$BTRFS_IOC_DEV_INFO(r4, 0xd000941e, &(0x7f0000000480)={0x0, "28762aeb85c3cef80bc9e99178caed9c"}) r5 = socket$packet(0x11, 0x3, 0x300) r6 = dup(r5) setsockopt$packet_int(r6, 0x107, 0x10000000000f, 0xfffffffffffffffe, 0x0) setsockopt$packet_tx_ring(r6, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$DRM_IOCTL_MODE_GETCRTC(r6, 0xc06864a1, &(0x7f0000000140)={&(0x7f0000001480)=[0x7fff, 0x6, 0x0, 0x1000, 0x6, 0x7, 0x80000000, 0x200, 0x10000], 0x9, 0xff, 0x9, 0x4, 0x3ff, 0x0, 0xb1, {0x6b, 0x6, 0x3, 0x40, 0x1fc, 0x7f, 0x7f, 0x3, 0x9, 0x9, 0x9, 0x1, 0x40, 0x8, "01f91f47ac9713b3263912cb6e8c5eed5046a383680c3d3e60e7ef44fe959b44"}}) 05:17:51 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02252545e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 493.933600][ T3052] affs: No valid root block on device loop2 05:17:51 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9a0f02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:51 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa034f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000a01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:51 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000100)=""/103) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:51 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x3800, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:51 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) r3 = socket$packet(0x11, 0x3, 0x300) dup(r3) r4 = dup2(r3, r3) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x3b46, 0x3f}, &(0x7f0000000080)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:51 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257809e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:51 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000005c0)={{{@in=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f00000006c0)=0xe8) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe1}]}, 0x10) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, 0x0) setresgid(0x0, 0xee00, r4) sendmsg$unix(r0, &(0x7f0000000740)={&(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000240)="dba2713b2c2cd6a0f0c44d0fa0fae463c2a49d412ec8cbf0d7bd939fa179560db7677cf7fa9349e71aa0e48f27b919a58f9021ee031b93f2fe261640c99df748b88175df6cbaea8de734953749acc6136a2029574d8b3c9b5098af296f49ae114154533177c9a95c7197b4d762aaec6fa079466fff851bcf19c097ebae67844744f4b50e3be8f536d35765607f47812a2d2e06e81c9b771a0a7c7d37a56861ff6cbbfedf0557be12f5320b80ddc50a3685bcca4444eaa7e24aeea7b11a8e7642391a0e1a6555abf74f6093ace56925bdaf043b7c9997442a6b77a65b33132079632974399046c0fc36413b0cfc73568adb", 0xf1}, {&(0x7f0000000340)="b40b7d1c82c9d345886b43a3607993d877354404199aa2e5dbd196ff4367019802299851ace5d6b0aaf05d0d895c8dc679b6f8c1e3155d974c5ff41965f1b684cbc3824ff969e90e1039551dbd61f45787b8d34c3117f9a2c1c071e375da9d638400d3abb389a44a57213cbe9c986762bf0acd945ca1cb52b51f2ef1db49407adfd9226e999c640eccd80da1e3948a7a4709ac55c7", 0x95}, {&(0x7f0000000400)="75a64679eb7522004c93bb360d37d77ccd90cf21d999fb88f77e0844db9affb2b22ff3151196e6b10c9a050a4fe2be591e8d826685748ea871fae07748ccfac09a46586fe6768865d5d2f98cf7f88c68cc8de9f0af80fb4d7afd77086df015a70b62533991c8fec18864d416051dae99614bccf322a75c99dce6d8b9e0f8a1a4dd2b0873747c9f1a", 0x88}, {&(0x7f00000004c0)="d32cabcc8a22756fddfea886c72fc067a3c7fc4d2fcb825f69e0911b18d0df8566fc6f0797c46721e89a2adb20fa289894f42743ece6367b805e862255fb2e308b26fe5f89ea65b14d85e715ca905aa1c36f009945443b85fe6239da952a8afaa451ef416ccb0c2de55958403b0e28c03d0e7d2b8cc8e67d9c3105838e95dbfbaa7cde774c266ceefffa60558eba3620a26ba36f202893a4394102f14914331958dc8bc46ffc6041356964c85e7ab5f777a104b920040afd23dfcbe38e2e8dc9fa38dfb7a9271e8e9c649b84c44dca09cde45c590baf4eb8171fb66917e8f2188285eb27ba106c61bff48fa7041947", 0xef}], 0x4, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r2, r4}}}], 0x20, 0x4000000}, 0x940) r5 = dup2(r1, r1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x80000, 0x0) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) ioctl$VIDIOC_S_DV_TIMINGS(r6, 0xc0845657, &(0x7f0000000100)={0x0, @bt={0x5, 0x3, 0x0, 0x0, 0x4, 0xf31, 0xffff, 0x5, 0x4, 0x10001, 0x0, 0x4, 0x3, 0x5, 0x8, 0x2c, {0xfffffee8, 0xff}, 0x3, 0x9}}) 05:17:51 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f0000000000)={r1, 0x6, 0x6, 0x2}) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f0000000080)={0x4, {0xe50, 0x1, 0x5, 0x0, 0x1, 0x4}}) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) [ 494.387722][ T3101] affs: No valid root block on device loop2 05:17:51 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257825e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:51 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa044f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000b01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:51 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aef02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:51 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = syz_open_dev$sndpcmp(&(0x7f00000013c0)='/dev/snd/pcmC#D#p\x00', 0x4, 0x8000) r6 = openat$vnet(0xffffffffffffff9c, &(0x7f0000001400)='/dev/vhost-net\x00', 0x2, 0x0) dup3(r5, r6, 0x80000) dup(r4) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000001340)={r4, 0x7, 0xfffffffffffffffc, 0x14}) ioctl$VHOST_SET_VRING_KICK(r2, 0x4008af20, &(0x7f0000001380)={0x3, r7}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000012c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000001280)={0xffffffffffffffff}, 0x111, 0xf9d495ab0f258605}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000001300)={0x7, 0x8, 0xfa00, {r8, 0x1ff}}, 0x10) r9 = dup2(r4, r4) setsockopt$packet_int(r9, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) r10 = openat$vcs(0xffffffffffffff9c, &(0x7f0000001200)='/dev/vcs\x00', 0xb01, 0x0) ioctl$KVM_INTERRUPT(r10, 0x4004ae86, &(0x7f0000001240)=0x3a) pwritev(r9, &(0x7f0000000000)=[{&(0x7f0000000100)="0cd1243d4b5310dd9bfab60b3550b65dc151ee8c19ea49ee7c8e905a3aa5bf8db7eff21041c58501f67fb2acffd920e767fb2dddef92716dd862e01cb113b72fca01c8c3905e2e88c3f13cea743a805acaa44f09871d4ce9a7fa86ee299873d710a3144bbe8ad4ce6a5560c97f3e8144b2a8a33dd3326c3d28d4af7f08ffa2b4297a91306858c90f0bdbf51f788ba5cc3b7de976937d15b99831b04698481ffee8170f5143caa4b166ab72732e1a0b9b7cc6965dccfeebf96cdfcd6ce14a2afcbbc2fbb9bbe9d936b1f54312091771740eff7a92eaceb8c3b22d1171adc96bbf2a69b4114cf3867ec35fa3d16b7f05ac65fcd4f713ee901b0c66231484f6e3342b53907b613a93a5d46e14f7840e64e2e3add1131a3e33eafc519c65b2751acfb8bf21ec9ba0db0f606251dbf37da5a001e16ffa49de1c7c57c86ffbc9be5b5e48a9ce1f321c94d56fdec0d2a21d9c9e2a7ebaa4ee0dfa1fa52a8bf86d9c756f5d8e461756af5f16fd7c8eada297866a95ff39501ef742669516d351599c725392ed65e95d1063743d7ac45fba850d2d5954be9bd5d03b3991eaff93c8c01f3c396cb8b13cc20f7277bf7e2e5b5ff40172e0d877aba3a7f7388f1d6ca646cf254658f57b4a0d3aef6dd3a2949c83d9e14dce271402e75190bad643688880af17f357083ecf4c095be50897b9bfa8ca3a5aec5f011c92953ac5a5b1d9655444cfd4d5a429a8ac7c250a600eddcd215679f93d80eaa1a3d14fe04f621d837d7c8eb4f8defd8a11c7b309704fc43b7191e3c6d7b1f231f4f2a668ac39fe51019cb1eeca932df83384e98c2f13480f5bd7c6d359a79a0aec9cca08925bba586f15a9704fbb05f8feea951a5c36c14823fa37c14b1b5f029f9ddba48dd7c85362253d59870f7b15a3f938e547c2d22b7a83d94fc0cb547cce7d3bd71d97767372b4d82e22184ff90459fe2bcdd474cd481aeae1887640ce89acb66dfdaea8c7ce3604a4862b97028071114d99599dab288b82cdea95c8adb74b63c31d52ab943f37025cdeff8f6ccbf65c6baff5bcf32d4dea94ddce9cbce505a18d964e2f02dfa7b352693da2ccc143fce53718dff371f0c0966a32702893a5e804d8ccef27f81e123bf4f63bd37bd9834523616c35f5f28a8e2f8bc9cc42d47ae11be2fd8ea731bc4d7be8fee5b773b6050b7da57d56ae01aec3c1a71b884f9150af44983ff390031a63d509d59d9270381d8ae0c8bd51f8574162d6432be8e7e6b7c1e83662f2b3f6e237b6ffddaffd3ef568ca45f803271ec882595a321f500154438b9087d9cb831ddffd7111a4ed1997f03a941010df56e9c6065cf324fe28b6c6421142b7777927a0ccef2e9fa933fbab51404d38cb04ded64a8e44e6072820eab2391d7c1e6f33d3f3d8102b88de887c0c30a16c91571b79d560a80487476b42bd7c136a86574d8e0a5fcb577d610bc5a98ef7e019942be1e94673b87c8c03a4bf26c39636198be67d7e638212bba76c697300d96be06309f822240b9459898be9ece40ce5e2966e5b15d59eba8278d5a2a558e18ca8ac7c05907bf1385bb6e5e3f9c12582d752ec695398ad59f25f8d12ba966c89409b4d77aca6ed72bf9b3b0d5d454b06f1353eede80bdff258367bfd59c846b98ba8d469aaf18418aa77f4b9cce2aaf2f2b2f67b8cdf1cac7f149d53e7684eac252bb8e9ea0ddbad7f755248a9a9ba802f12eebe0547893e5b5e780f660b7a79c39487a26c8d0944370bc3feb3658b92531359eced877dcc4eeaf3152dbcf7cbde3a8850c1564c03a575fff07ee5799bb36f6b73d9b9a62f551cdf0f0597fe4c0ecd8e5d940c82c47a0fb48c78c4fc85a0bfc2e36ab8850615e5a04fe8b2456420ae539434c9c6462f0e5201a9ab03364ae0f376c3198177434e467f1739cfa1c3b1332a401b762b50d1a7d7814d0c34f6e64f48c6d477d7707496d955ea82bced09c215fdf880b232be4fb40ad8a8a87e37d620f286293395210770034fd0d9367cfe0b2fbd85c00d3a3409a48a84933574a6ba201da78923281d71107ae458b5b35a1203db706c5cc4addc46776c680ffa348e877c7e13ca0a551b06fba111c191e932e9ee2e70f51c46af7259bf705bfb4b86801b8b473aa0d509f7b78daa5bd56cb41f0dd77e219176849d06887ae9bd38f9616643669a96af93018fc4d0847975c767feb8cfe61b5ef052bd0f7774af997e8b33b6b5bf2660f4dab19000637709512850bfad270098d96d64d0b597f4a22ca56051a5cfac1a83a2153c5a51c4b5531ec8a0c8e2860cc29282bf26ef51bc92f59898d736167a36cf6167a05fd7d096bc7f5104da1434bd9ceb219b47d3874179800b3c599f28c2b5e344890b8730f945fd1a82bc210bf3550f35b270a4d814e0ce780839e2ddda6285162d40b279373512560340080b163336fcbbaaa21dadaab13562cbe9d66772b301ad045d71e13474ef3eaf0618b36051029347007ed23dc9e087a6711aa078b9134a193064f578043336bf2e59a2eca1a97f5d5150f9933bb95793bee45dedebb3aea5a2a622073c13c3dbecdf593dbb0ff3e272387a0ff03c132d5f2ac5fccc36d20cfb51050c9578edc0832514596543e314bd64f7d9a51d0e981a16c6966430aeef20446483f163f71bce9d99681cb0efc9bc378f0cc5f8f6e4c296115a91cecef37eaf509e775c13e7eaa2f3fbcbe6076022bb3a4e418567ea7b641c6fe250414a9b67bb0b40c73b4aaca0d16db8198e69fffef412c6745ed102a0232c24b1f864a3ce182f57f9c8d9e1ba5e276eba0d1490fb400badeac677d6e26101b5f2e9c56db81ba62b6467211a9de03f1a5b7fe4da7e63685da7855fb6761b02302b3810460bae8fc389eec1db7bbe2bfc4d48bec0ea85131f8e575edc9f691cd0fa5f33b76354d504a7151b409a2bd55954c3a8da302d9e8550dece3107e554dfcdd185cca522693e613230740e9c1ebb3d92ce5782d22197ddb28d968d1ccbe70f9eb980718305b1243e9f0e9fb3cc1fdf196b2819a6cac757fd8eca629e282dec35693f849e8ec594de1143b2e9cf6908437d8dfc3a84542d1c3947de7ca48bcb4a7f6a74e38b0eeeac678254d1813f97e836ecc80c1c5de596e7652f42e7a9126b521f521cbcb38f57e4ddc533a5ec4aa0492036c4b0c82e2fdf541789c08e0f19e4e426b7bf5db1c5dbab947e4d22513abd4caf319bb167be0649dd52c484a3670715d4c36182e064a66ba9cc2b37e39bdde85bec7c07cbc3d19fb5de44422a8dfa38f720986a22ce606af3d3a0188ba40150640e060a6673fff2a70dded70758201abc64a28dc3ffe4e6e46736577214d2049ee2eb49c508a34a158655310656c2334dfad754cd9de1e73879bd75666cf00a7a05bfbe09b7fc846c8d9e80cd85bc124a21e3dd8b33ea6d249f593821cfa8a1b9938fcad8c23d3b08afb6063c153fcf9308d0fd41eea05f5b38e2e86fdf08e4614d89a81c86c77e49eb35b1ee87087b504bfd7f54006485ff985f9799dc288aaf5fe1b4a974197bef1fc474ba3e1ff971d43b0ddb161a81471354a7966f3ca01f75f844c49c403fc804609d649bd62407ba7162edb26aa61b4b0bde120d660509e78ad6e0b166478fd6f0dd30483fab018a4375d0a5a48bfddc4dfe4f3f1df57803cd82309aa542cbf48992025012ba6c0b396a71888e9cd2e7283956ec339e7e24c2491223b55b02e798628f825bdeb22da6753887e31f094083a27ac516adb8611a65ac2c7a81515549b7d49924535f4f0967d425f797af42e7f2437660ec3fe9a633bb5964f152797e270aa79b4dc423d1f0fc09364cd8266bf3990a6dc1a2b4a0adb0ce852d7b2720f18729607a6866feade6bb956731150a15cb5aaf22221a13557de3cbc72327c54ccc021bac293d247593bab7cc64be89cdb838cb1b34f6286929155df9feec9f20f216d9b083aa83e7f12c1e95104a44f8869a889e31231756f9d4179ae902f41d49652db922c59a1a2dc58e2c7b35c33b7d7a69756fb15372a5aff9bc15be6b5c18342344ad37607f480b4639c01816daccbf9dc1eb07bda12878d26cef966bcca15e010762dfa7a2aeb98f5f272e1e7cfe6d6bb6ca2f357138092698fd4d83ae3074fd0ecd51cb3d340c966d54f16ed55cd6ea896165596fdad3179ea58e19ee4b63901c51e2776a339f40495989d0f13cdcab392faf6d96f8a0544bd22d58714a5b3dbabc79096e4a91b5bda6399c865e7733da7f27250864e34002f4d096d79a886cf94305f89e886750ef667d60e61b75a4d540b807fd37d1f6c07b1ac5c5e2f7075e2404f36a57c974b932e0d50e00fafa3bfd0d529f6db9aa688046fc327f8e16d8ea2ea36c575e591632489a8efa71efdc19047a438e46417d4c40aa7d799d73da4aabbf2f88c03141cf6a6602cb54d442b9a57c241b884a0e3e21b57a76a3e4a47b5c6aaa53931eedb7fb747ed908640aeeedb5875315011e36180b4fc43d186c410ea50516dd9524754a4bd3ed4e6a76119bd4fbd8d94e6162de8370266e9056949bd0cbf86970ea86cdc870da7e020f41132c8a8ee9fb4230f2eb607497bb5e67d624a51edcbf5d8c56d0d2376109f61bd7dfb59ac4120713f0f0712083cb922a888ef92d5c7bf044dbc3d94dfa74ace3ea39b3f8ec59a268e5a46a8db6c268f811a904076e1dcfe6e60e5ecf4fb9a913c4b1a339dcf7f0e052d25c37607462a1fcba395b0220dc7d8b5cc88c2fb138f3fe84204f22257d3ef7946791151e18193d7a0efe4612a53cd50d62b644b8a7d07214e845e6b92f2e6f8b5818a50458ed3c8c6e513a1e5b58821a3b15fe4115c893b3637e6b2d08efac19bee406c187d08907e34de1417c53f95389c92db3881d94804bb5109aaae3e1a66307109218ad721b1c071e130f7979b85030c3307c5e513cf844cad66080f29969cedb8565eee8b5da431d4922714f6ee9cddf4e858e9c475dae4475bcaa10040047356fd747e71513c1303267f881c64d480a0c2df884f869cd44fb207e5dca0e3dde17c68e5a556c533836b22b38d7e04739f0f21865a8a2a55bbaf0fd3f5858ba0c0a75231c32fc34ef9a9e297dd931d46b3bf38ac7051f1d9c0514ad1463f650f928f43eeb9c0c879f118cfa9fdeb0dc35ea5ed1213bb2dff5068ec0019af059bda3dcabc3dd6cb2b99fec10037d8b5313e0026540dcfa27fba29fa254b599ca2bd62c446c000ac1d8825f51893a1330d4e3da8b4acd96298e5e8dbcfd77cc263c08fd33ddc3080be6516a1549e372b8db534cbe2a9737a5522c51312ff32ff31468acd8c8fb8f8c63b78d5bf570737133e67452a47008ef453b7f3b7c9e3227e54b8f9333a25e3b4469ea06f6e3f14eb1ab81731ce3edec0f9194457bf1ecbcd961a0c8c850f0d33d2e81ee46cda48c3fed58d9bae4e3564f7b66a417984b78029757c83d0ac77e64b84747cd1190bac303264d03d1ccc047f6ae8e1aeff9b4a0fe667c18c0327b988c49f070edb0f0c5a50cdf779f94f9e14279729e0a6c679e9ee3707b264320fdc5ed74cf6069401367b6a15d661649aaaa803ee360b5ecc77582ff207937fd47d8202afe1c41c87b64c92ac88c4f2ce756c057e6f1cc284eedfc180559ccdc3c349b63ca602d11dee4d87048c608eec51680d9a0a2fc17bd3340884a98e872c4ae85d34b6b092d3529313f8c2c7afab96ba73974b4557a33bab6fd5a88beea30c18f798e056760da6e6924147e576fd5ef4cccad5aea02e1ca59f38e39ea0bff1f0b0dfecb22afec", 0x1000}, {&(0x7f0000001100)="04c194baa99eaf7388b09c8012a4dc418e9428009f71ecb51300652ac68825f4109bb90bf32163574bce58c5299b4b0d621793fdf3afee2f54673704c1cdf6ea74818e7777b90aa7ba7f2a8f088b346634e4f2cd2f936eb2497f51a55790b648191dcb9edbedc22ccd281a764a888bd3d3599b06e448d3fd1814352027bb0049043f97d3025c85358ef56d3bf170a2b5c7d414ef3e7350603696cd0213adbf1e54b738c1e3caf59cfdbabaeab5bb909c4db578c28eb12783562bf50ff8bf99806545c0e4156350da88e4363504616d9d4097ee537c19bc307488e4295d0e4601caf0b24c49be7e8df05b2ba468d7a246e81c", 0xf2}], 0x2, 0x80000000, 0x2d86) 05:17:51 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x8b00, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:51 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$CAPI_GET_ERRCODE(0xffffffffffffffff, 0x80024321, &(0x7f00000005c0)) process_madvise(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000100)="33165a274b5a96ccee81e42148ed1d6c0a884147ea0cf10b4f544118a537ac37cffa96b6d31c7339a3eabe249ba60a5bf46049d8bab5688f076218706e5a3976558b1c8451097082b42fcc983b6ebaa602bade7a2fd7eedeabedc0aad5b4253ffed4c99e9da0db5a04c29b95f33642f1106626539b80ce1ffe6a556c300111df1f0f59a1f3837418dab4354a4b86b0bfbedc62a4698f0deb9050bb7a805f96220c79c57f38a5389d0d92ebc12b552417", 0xb0}, {&(0x7f0000000080)="78ac9a98ae33e96bf206754dceeebd156485fe4729", 0x15}, {&(0x7f00000001c0)="6a2f6ebb4755fc573f36580f36b42349fd0ded17dd4656dd3f30479e6ae36a400c081f192d3f7885c4c4f991704564416b1c4464059f233c83530a3e7f0249f99ea739ef42c4e0d5787c039258afb976811f03a70822c518dd95a085b499007cc56fd02cbb308f93171b18dc574e063b98ad80dd405f56cde61951a3bc0c211f49e5f63e62d464d11e4f41bbbdcb73ae598996995f0eda5c25634c612d9febf2", 0xa0}, {&(0x7f0000000280)="c7ec952c5c4d29647f18935512d69721f57909a994af412fcec5913464fb502c23e245a607db538b07e255fa619e9e91aefc3414f7bb3bd7650b606f7815b5bd7ca093b7882c7087a9db2d958755e26c78357dec39d4b211ef64542b92bc676581b84b4e2103b09d39897292c125b5c4660f8505554b9216f43f8ed758da3b6bd0f557b72c6ce4d161826776412ef91be9ee4ccdb09ecefbb5c2d191b0378d5b2a97e69d7356d7aed833b1ba2fe80849375be3bafe0fbc14dcc8df80f93b7e86fe745b8e2206e0fa9fa721a7f087a97ce8e940aa4f4d12b85be41384958a90772e8fd92de20310a91579654a92c26b25a772792f8b", 0xf5}, {&(0x7f0000000380)="0eaa3eb095f647a603a3e74f2147315557b082e003978d072d96e62ce22f699c9d22035179ae7da17dead952824f64aabfd528aaa5d3558aa2786d622b58e4c40dbc1221939c0c5838b0b6138f279329b611f9211a4ec9dbfd7b745d5625cc4be2ad9dc82a7a8b255e899ca440d4558131eecfaa98c2bd7945a0c7a5f0148624b6133da7dd0dab668324ebe8a9bedaa00285904951d839d18edc6f1c3664121c6f6f1452376d831e32749161455d3866a9e8ac3c84b7addb2a1854fb02f9541ed8d5bd51245f57c4918c573bf93468cc4a90eb297d0729956444cb39cd534d7f65821262b3f9", 0xe6}], 0x5, 0x10, 0x0) 05:17:52 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x96002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) r3 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r3, &(0x7f0000000000/0x13000)=nil, 0x4000) shmctl$SHM_STAT(r3, 0xd, 0x0) shmctl$IPC_STAT(r3, 0x2, &(0x7f00000001c0)=""/173) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:52 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$USBDEVFS_CLAIMINTERFACE(r0, 0x8004550f, &(0x7f0000000000)=0x6) r2 = dup2(r1, r1) dup(r2) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) dup(r4) r5 = dup2(r4, r4) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0xb0700, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r6, 0x84, 0x6c, &(0x7f00000002c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="c1000000378a8eca16c037bb7363966b13811e34a34aaef38c2f2dc417fda5918f9b5eb3bff79cc7839677cd5589a22b406d8574bbc58597fc88ecd3d73542fdd824e1674501812291d09ba73f2e5873f6cdeb0df29907bbf437d68cf00dc4f00000000007a5bb510acd1e07013b8ae8e9f875d7b5def7c58da5301e980404e04901fd95cb10917814b0107cdd01512336cdf9a56b373479dde8ad36df6d649973bb76ad07000000000000008a0cbb7dedacf6b9c16a4c3761af026dcb681a0b8800000000b739fa3eade875f935503192512b04260b412a5a4e86fff0ee2e56c31b5fc8c2853ec975456f55aff4053d08a3a202"], &(0x7f0000000240)=0xc9) ioctl$VIDIOC_LOG_STATUS(r5, 0x5646, 0x0) dup(r3) r7 = dup2(r3, r3) setsockopt$packet_int(r7, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) ioctl$SG_GET_NUM_WAITING(r7, 0x227d, &(0x7f0000000080)) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) bind$rose(0xffffffffffffffff, &(0x7f0000000280)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x1, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @bcast, @bcast, @default, @default]}, 0x40) 05:17:52 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000100)=""/241, &(0x7f0000000000)=0xf1) 05:17:52 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee0225785ee976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:52 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f0000000140)={0x81, "b4ee010f6491d8ba550998a804846a4bbaf6cd731af1e2500b600aac0bce1f27", 0x4, 0x1000, 0x10001, 0x2, 0x8, 0x4, 0x4, 0xfff}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) dup(r2) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(r2, r2) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) bind$packet(r2, &(0x7f0000000640)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r2, &(0x7f0000000300)="0503d03206023e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0xc800000000000000, 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000200)={'bond0\x00'}) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) r7 = dup2(r6, r6) getsockname$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:52 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) dup(r1) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(r1, r1) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r1, &(0x7f0000000300)="0503d03206023e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0xc800000000000000, 0x0, 0x0) sendfile(r1, r0, &(0x7f0000000000)=0x6, 0x8) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:52 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa054f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000c01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:52 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0)=[&(0x7f0000000000)='/dev/bsg\x00', &(0x7f0000000080)='\x00', &(0x7f0000000100)='/dev/bsg\x00', &(0x7f0000000140)='&\x00', &(0x7f0000000180)='/dev/bsg\x00'], 0x0) 05:17:52 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee03257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 494.973758][ T3149] affs: No valid root block on device loop2 05:17:52 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x8d00, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:52 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x1, 0x1}, 0x4) r1 = dup2(r0, r0) r2 = socket$packet(0x11, 0x3, 0x300) dup(r2) r3 = dup2(r2, r2) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf7, 0xf7, 0x4, [@func={0xc, 0x0, 0x0, 0xc, 0x3}, @struct={0xc, 0x4, 0x0, 0x4, 0x0, 0x442, [{0xe, 0x1, 0x401}, {0xe, 0x0, 0x2eb}, {0x6, 0x1, 0x7fffffff}, {0x4, 0x0, 0x4}]}, @const={0xe, 0x0, 0x0, 0xa, 0xfffffffc}, @func={0x1, 0x0, 0x0, 0xc, 0x5}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x1a, 0x0, 0x6a, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x1, 0x9}}, @datasec={0x1, 0x8, 0x0, 0xf, 0x3, [{0x3, 0x5, 0x5}, {0x3, 0x2, 0x7}, {0x3, 0x9, 0xcd}, {0x3, 0x40}, {0x5, 0xffff40ed, 0x4}, {0x4, 0xffff, 0xc1}, {0x2, 0x9, 0x8001}, {0x3, 0x1, 0x1f}], "e9451e"}]}, {0x0, [0x2e, 0x30]}}, &(0x7f0000000240)=""/123, 0x114, 0x7b, 0x1}, 0x20) r4 = socket$packet(0x11, 0x3, 0x300) dup(r4) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(r4, r4) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) bind$packet(r4, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r4, &(0x7f0000000300)="0503d03206023e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0xc800000000000000, 0x0, 0x0) r7 = dup(0xffffffffffffffff) fdatasync(r1) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:52 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$packet(0x11, 0x3, 0x300) r5 = dup(r4) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='io_uring_submit_sqe\x00', r3}, 0x10) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file1\x00'}, 0x10) ioctl$BTRFS_IOC_RM_DEV_V2(r6, 0x5000943a, &(0x7f0000000240)={{r7}, 0x0, 0x14, @inherit={0x70, &(0x7f0000001480)=ANY=[@ANYBLOB="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"]}, @name="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"}) setsockopt$packet_int(r5, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r5, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) socket$inet6_icmp(0xa, 0x2, 0x3a) ioctl$TUNDETACHFILTER(r5, 0x401054d6, 0x0) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) ioctl$CAPI_CLR_FLAGS(r0, 0x80044325, &(0x7f0000000000)=0x1) 05:17:52 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)=[&(0x7f0000000080)='/dev/bsg\x00', &(0x7f0000000140)='/\x85(\'\x00'], 0x0) 05:17:52 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e95ccb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:52 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000040)={0xfff}, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000000)={0x0, 0x80000001, 0x5, 0x7f}) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:52 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa064f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:52 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)=[&(0x7f0000000000)='\x00', &(0x7f0000000080)='/dev/bsg\x00'], 0x0) 05:17:52 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r3 = socket$packet(0x11, 0x3, 0x300) r4 = dup(r3) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$USBDEVFS_IOCTL(r4, 0xc0105512, &(0x7f0000000000)=@usbdevfs_connect={0x40}) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r5 = dup2(r0, r2) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000d01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:52 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee04257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:52 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) gettid() r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) [ 495.613965][ T3231] affs: No valid root block on device loop2 05:17:53 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xe300, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:53 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:53 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868252450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:53 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa074f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000e01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:53 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee05257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:53 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)=[&(0x7f0000000000)=',/\\{,\x00', &(0x7f0000000080)='(:,)-\x00'], 0x0) 05:17:53 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb88685c2450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:53 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$BTRFS_IOC_WAIT_SYNC(r1, 0x40089416, &(0x7f0000000000)) openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x4400, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) r3 = dup2(r2, r2) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)=[&(0x7f0000000140)='\x04', &(0x7f0000000080)='/dev/bsg\x00'], 0x0) sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x200, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000c0}, 0x4084) 05:17:53 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007180)=[{{&(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000380)=""/166, 0xa6}, 0x2}, {{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000440)=""/203, 0xcb}], 0x1, &(0x7f0000000580)=""/143, 0x8f}, 0x9fe}, {{&(0x7f0000000640)=@l2tp={0x2, 0x0, @remote}, 0x80, &(0x7f0000001a80)=[{&(0x7f00000006c0)=""/15, 0xf}, {&(0x7f0000000700)=""/61, 0x3d}, {&(0x7f0000000740)=""/9, 0x9}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000001780)=""/1, 0x1}, {&(0x7f0000006100)=""/169, 0xa9}, {&(0x7f0000001880)=""/86, 0x56}, {&(0x7f0000001900)=""/51, 0x33}, {&(0x7f0000001940)=""/67, 0x43}, {&(0x7f00000019c0)=""/192, 0xc0}], 0xa, &(0x7f0000001b40)=""/151, 0x97}, 0x5}, {{&(0x7f0000001c00)=@in6={0xa, 0x0, 0x0, @private1}, 0x80, &(0x7f0000002100)=[{&(0x7f0000000240)=""/49, 0x31}, {&(0x7f0000001cc0)=""/51, 0x33}, {&(0x7f0000001d00)=""/39, 0x27}, {&(0x7f0000001d40)=""/139, 0x8b}, {&(0x7f0000001e00)=""/82, 0x52}, {&(0x7f0000001e80)=""/205, 0xcd}, {&(0x7f0000001f80)=""/77, 0x4d}, {&(0x7f0000002000)=""/8, 0x8}, {&(0x7f0000002040)=""/163, 0xa3}], 0x9, &(0x7f00000021c0)=""/83, 0x53}, 0xff}, {{0x0, 0x0, &(0x7f00000023c0)=[{&(0x7f0000002240)=""/105, 0x69}, {&(0x7f00000022c0)=""/217, 0xd9}], 0x2, &(0x7f0000002400)=""/209, 0xd1}, 0x8}, {{&(0x7f0000002500)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000002640)=[{&(0x7f0000002580)=""/9, 0x9}, {&(0x7f00000025c0)=""/79, 0x4f}], 0x2}, 0x9c5}, {{&(0x7f0000002680)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000003940)=[{&(0x7f0000002700)=""/232, 0xe8}, {&(0x7f0000002800)=""/4096, 0x1000}, {&(0x7f0000003800)=""/145, 0x91}, {&(0x7f00000038c0)=""/100, 0x64}], 0x4}, 0x3ff}, {{&(0x7f0000003980)=@caif=@util, 0x80, &(0x7f0000005e40)=[{&(0x7f0000003a00)=""/4096, 0x1000}, {&(0x7f0000004a00)=""/114, 0x72}, {&(0x7f0000004a80)=""/98, 0x62}, {&(0x7f0000004b00)=""/130, 0x82}, {&(0x7f0000004bc0)=""/62, 0x3e}, {&(0x7f0000004c00)=""/234, 0xea}, {0x0}, {&(0x7f0000004d00)=""/112, 0x70}, {&(0x7f0000004d80)=""/4096, 0x1000}, {&(0x7f0000005d80)=""/184, 0xb8}], 0xa, &(0x7f0000005f00)=""/168, 0xa8}, 0x1}, {{&(0x7f0000005fc0)=@caif=@util, 0x80, &(0x7f0000007140)=[{&(0x7f0000006040)=""/109, 0x6d}, {&(0x7f00000060c0)=""/11, 0xb}, {&(0x7f0000006100)}, {&(0x7f00000083c0)=""/4099, 0x1003}], 0x4}, 0x12}], 0x9, 0x40002102, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE(0xffffffffffffffff, 0x5000940e, &(0x7f00000073c0)={{r0}, "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"}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) r3 = dup(r2) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x82, &(0x7f0000000280)={r6}, &(0x7f00000002c0)=0x8) r7 = socket$packet(0x11, 0x3, 0x300) syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1f80, 0x404400) ioctl$BTRFS_IOC_SET_FEATURES(r0, 0x40309439, &(0x7f0000000200)={0x1, 0x7, 0x19}) dup(r7) r8 = dup2(r7, r7) setsockopt$packet_int(r8, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) ioctl$SNDCTL_DSP_SPEED(r8, 0xc0045002, &(0x7f0000000080)=0x1f) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000100)={r6, @in6={{0xa, 0x4e20, 0x3ff, @remote, 0x8}}, 0x7ff, 0x3}, &(0x7f0000000000)=0x90) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:53 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) dup(r1) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x3, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0xfffffeffffff21f2) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:53 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) [ 496.274559][ T3293] affs: No valid root block on device loop2 05:17:53 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xe400, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:53 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) r3 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x9, 0x200001) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040)='ethtool\x00') sendmsg$ETHTOOL_MSG_RINGS_SET(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000300)={0x34, r5, 0x413, 0x0, 0x0, {}, [@ETHTOOL_A_RINGS_RX_JUMBO={0x8}, @ETHTOOL_A_RINGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}]}, 0x34}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000300)={'ip_vti0\x00', &(0x7f0000000280)={'tunl0\x00', 0x0, 0x20, 0x8, 0x7, 0xfffff2cc, {{0x10, 0x4, 0x3, 0x21, 0x40, 0x65, 0x0, 0xf2, 0x29, 0x0, @multicast2, @local, {[@lsrr={0x83, 0x1b, 0x8f, [@multicast1, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, @remote]}, @end, @lsrr={0x83, 0xf, 0x92, [@remote, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}]}]}}}}}) sendmsg$ETHTOOL_MSG_STRSET_GET(r3, &(0x7f0000000500)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000340)={0x158, r5, 0x2, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_STRSET_STRINGSETS={0x5c, 0x2, 0x0, 0x1, [{0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0xb}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0xfffffffffffffdf5, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}]}]}, @ETHTOOL_A_STRSET_STRINGSETS={0xac, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x5}]}, {0xc}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x2}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x6}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x1}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x8}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x4}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x3}, @ETHTOOL_A_STRINGSET_ID={0x8, 0x1, 0x7}]}]}, @ETHTOOL_A_STRSET_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x158}, 0x1, 0x0, 0x0, 0x4000084}, 0x48001) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000200)={'bond0\x00'}) ftruncate(r7, 0x80) execve(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000180)=[&(0x7f0000000000)='bond0\x00', &(0x7f0000000080)='bond0\x00', &(0x7f0000000100)='bond0\x00', &(0x7f0000000140)='/dev/bsg\x00'], 0x0) 05:17:53 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee06257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:53 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa084f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000f01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:54 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x7f) r1 = socket$packet(0x11, 0x3, 0x300) dup(r1) r2 = dup2(r1, r1) setsockopt$packet_int(r2, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) openat$proc_mixer(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/card0/oss_mixer\x00', 0x10d402, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) dup(r3) r4 = dup2(r3, r3) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) r5 = socket$packet(0x11, 0x3, 0x300) dup(r5) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = dup2(r5, 0xffffffffffffffff) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) execve(&(0x7f0000000140)='./file1/file0\x00', &(0x7f0000000040), 0x0) 05:17:54 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868620850cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:54 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x8001, 0x0) ioctl$SNDCTL_SYNTH_ID(r0, 0xc08c5114, &(0x7f0000000100)={"34e97176a6b39abe69d0f6b41b2208f7f4874a99634d65c36abe1a65d87c", 0x401, 0x2, 0x0, 0x80000000, 0x4, 0x76, 0xffffffff, 0x5, [0x2, 0x6, 0x7fff, 0x9, 0xac44, 0x43c5fe7d, 0x7, 0x66e3, 0x5, 0x3ff, 0x1, 0x8, 0x3, 0x10001, 0x0, 0x5, 0x7b, 0x0, 0x1]}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:54 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) socket$inet6_icmp(0xa, 0x2, 0x3a) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f00000002c0)=[&(0x7f0000000240)='bond0\x00', &(0x7f0000000280)='*{{*\x00'], 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="300000e7bd5ee85e43ae5975fd14937d80541920f62f39947345455a0f6956915033fa101d9554694fcbef", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf250c0000001c000280080009000600000008000900050000000800050000000000"], 0x30}, 0x1, 0x0, 0x0, 0x20000001}, 0xb7f2fe4d6aa08390) r4 = socket$packet(0x11, 0x3, 0x300) r5 = dup(r4) setsockopt$packet_int(r5, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(0xffffffffffffffff, &(0x7f0000000300)="0503d03206023e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0xc800000000000000, 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x7, &(0x7f0000000200)=0xba, 0x4) setsockopt$packet_tx_ring(r5, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$RTC_WIE_OFF(r5, 0x7010) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f0000000180)={0xc00000000000000, 0x4, 0x5, 0x1, 0x1c}) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f00000001c0)={0x100, 0x3132564e, 0x4846, 0x5, 0x1, @stepwise={{0x4, 0x7ff}, {0xfffffc01, 0x80000001}, {0x685ed565, 0x1d}}}) 05:17:54 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee07257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:54 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa022585f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:54 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb886862c050cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 497.095513][ T3371] affs: No valid root block on device loop2 05:17:54 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xe500, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:54 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = socket$packet(0x11, 0x3, 0x300) dup(r0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(r0, r0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503d03206023e0400a00000c513f7c25975e697b02f08066b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0xc800000000000000, 0x0, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = dup(r3) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r5 = socket$packet(0x11, 0x3, 0x300) r6 = dup(r5) setsockopt$packet_int(r6, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r6, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r7 = dup2(r6, 0xffffffffffffffff) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) 05:17:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e201001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:54 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee08257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:54 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa025c85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:54 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622425cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:54 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r3 = dup2(r0, r2) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:54 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfef24901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:54 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa025e85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e001101", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:54 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) dup(r3) r4 = dup2(r3, r3) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) ioctl$IOCTL_VMCI_CTX_ADD_NOTIFICATION(r4, 0x7af, &(0x7f0000000100)={@any, 0x6}) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file1\x00', 0x8, 0x1) 05:17:54 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) r2 = dup2(r1, r1) r3 = syz_mount_image$ntfs(&(0x7f0000000140)='ntfs\x00', &(0x7f0000000180)='./file1\x00', 0x7fffffff, 0x4, &(0x7f0000000380)=[{&(0x7f00000001c0)="2d107a24304fc07cea187d2f87e147b28056d2fee3c305eb52f0de8aa94a6b588fe461eada8487e7987053668483979f045ff75b32fb6d3d427c1b3d2937eb9378322aec479cf0cadf0d7acb84b516c795ee7c057f6dece8e7cdb3a8f8554ac08c9c2a5376b2493784b362863a11f6062b2d1d362f7512c35d9a80dbbe5c99e4919b1132b547a3236c7b3496b04dbdcd8d", 0x91, 0x7fff}, {&(0x7f0000000640)="da99fe7457acec015e938e4395d639b4300bae9274b70d5b9bd61a175eba6cbfa762a1bff91e346eb3424efed175a93e6c30873943435ca5325d0f7eea860390636e06ef9cb5d558957a6d578f1f0869d8ef00dcf5d48e35d36337000000000000059855", 0x64}, {&(0x7f00000002c0)="5e841447e8f0d79ea355fa5f8c8802b80d9c5101d6c28f98792359f0590afa9f7b1e5e718a0edbd078db1664d16113b7ba8572de29e6f47d1c98b343eb0c4cc322286c67aca733873b58e089dd883844125ea8b480ab", 0x56, 0xf67}, {&(0x7f0000000780)="0c1ca866d901a369c85ce9a26a405961b7b2b5402939d17a4e499787f5675d18e6f5728f8e2e668bcb97d0bb0c652fa396a0eae1381e58beaa5f2b01a61eaf42c9eb9dc38dc89a38b1ee0d3294bf0188a62641c2a616398cb6646778e2a87027bc746373e96670a141b58180525ffe076cf6643f3d2a45483151677f335a21acea942bea32d9dfc1a6903d058d50ea9bfcbac222153c565911c736eb7172a9daccd5d8fa885ccdfae0b872160a10b6183aa694e1e60d9ba0a8643a5cd6e4363ee23bf516607695165d4a57cc63000000000200"/224, 0xe0, 0x4}], 0x0, &(0x7f0000000400)={[{@errors_recover='errors=recover'}]}) splice(r3, &(0x7f0000000440)=0x1c, r0, &(0x7f0000000480)=0xbc4, 0xffffffffffffff87, 0x391d77fde34ecb2d) renameat2(r0, &(0x7f00000004c0)='./file1\x00', r2, &(0x7f0000000500)='./file1\x00', 0x3) write$P9_RREADLINK(r0, &(0x7f0000000340)={0x10, 0x17, 0x2, {0x7, './file1'}}, 0x10) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000540)) write$cgroup_type(r5, &(0x7f0000000080)='threaded\x00', 0x9) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) [ 497.799880][ T3444] affs: No valid root block on device loop2 05:17:55 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xe600, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:55 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$key(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x15, 0xd7, 0x2, 0x3, 0x0, 0x70bd26, 0x25dfdbfc, [@sadb_x_nat_t_type={0x1, 0x14, 0x1}]}, 0x18}}, 0x20000040) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:55 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee0f257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:55 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfef9f901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:55 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49002464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:55 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e001201", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:55 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = dup(r3) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$TIOCSPTLCK(r4, 0x40045431, &(0x7f0000000000)) 05:17:55 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x80, 0x0) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:55 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x3, 0x300) r4 = dup(r3) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) sendmsg$NFNL_MSG_ACCT_DEL(r4, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x38, 0x3, 0x7, 0x301, 0x0, 0x0, {0x5, 0x0, 0x6}, [@NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x5}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0xffff}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x1ff}]}, 0x38}, 0x1, 0x0, 0x0, 0x48000}, 0x0) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:55 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02252545e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:55 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa034f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:55 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49003464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 498.453156][ T3499] affs: No valid root block on device loop2 05:17:55 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xe700, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:55 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) perf_event_open$cgroup(&(0x7f0000000100)={0x2, 0x70, 0x1f, 0x8, 0x1, 0x6, 0x0, 0x0, 0x12c2, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xe0, 0x2, @perf_config_ext={0x2, 0x5}, 0x8000, 0x100, 0x8b84, 0x7, 0x7, 0x6, 0x91}, r2, 0xd, 0xffffffffffffffff, 0x9) r3 = socket$packet(0x11, 0x3, 0x300) dup(r3) r4 = dup2(r3, r3) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0xc8) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:55 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49004464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:55 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e002001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:56 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) [ 498.634037][ T3540] BTRFS: device fsid 034f85f4-9009-464a-9504-7a7b7f5c247e devid 0 transid 0 /dev/loop5 scanned by syz-executor.5 (3540) 05:17:56 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257809e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:56 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49005464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:56 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa044f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:56 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e102001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 499.039790][ T3564] affs: No valid root block on device loop2 [ 499.274302][ T3585] BTRFS: device fsid 044f85f4-9009-464a-9504-7a7b7f5c247e devid 0 transid 0 /dev/loop5 scanned by syz-executor.5 (3585) 05:17:56 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49006464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:56 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257825e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:56 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa054f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:56 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xe800, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:56 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e002501", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:57 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000003c0)={0x0}) r3 = socket(0x2, 0x1, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000200)={r2, 0x1, r3, 0x3f}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000000)={r2, 0x0, r0, 0x4}) r4 = socket$packet(0x11, 0x3, 0x300) r5 = dup2(r4, r4) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) [ 499.726974][ T3611] BTRFS: device fsid 054f85f4-9009-464a-9504-7a7b7f5c247e devid 0 transid 0 /dev/loop5 scanned by syz-executor.5 (3611) 05:17:57 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x200002, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) dup(r1) r2 = socket$packet(0x11, 0x3, 0x300) r3 = dup(r2) setsockopt$packet_int(r3, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x7, 0x6, 0xfffffffe, 0x2}, 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$packet(0x11, 0x3, 0x300) r5 = dup(r4) r6 = socket$packet(0x11, 0x3, 0x300) dup(r6) r7 = dup2(r6, r6) setsockopt$packet_int(r7, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) ioctl$FBIOPAN_DISPLAY(0xffffffffffffffff, 0x4606, &(0x7f0000000100)={0x190, 0x1e0, 0x6b0, 0x400, 0x81, 0x6, 0x18, 0x0, {0x7f, 0x2}, {0x657, 0x8}, {0xfffffbff, 0xffffff04, 0x1}, {0x0, 0x2, 0x3}, 0x2, 0x1, 0x400, 0x1, 0x0, 0x0, 0xffffff81, 0x7f, 0x2, 0x5, 0x1, 0x5, 0x8, 0x2, 0x3, 0x6}) setsockopt$packet_int(r5, 0x107, 0xa5aae045e8dd768e, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r5, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x18b, 0x6, 0x6, 0x7ff, 0xfffffffd, 0x0, 0x800000}, 0x1c) getsockname$inet(r5, &(0x7f0000000000)={0x2, 0x0, @multicast1}, &(0x7f0000000080)=0x10) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:57 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$packet(0x11, 0x3, 0x300) dup(r4) r5 = dup2(r4, r4) r6 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/ocfs2_control\x00', 0x90000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r6, 0x80045700, &(0x7f0000001200)) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) ioctl$SNDRV_PCM_IOCTL_DELAY(r5, 0x80084121, &(0x7f0000001180)) r7 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r7, 0x4008240b, &(0x7f0000001100)={0x4, 0x70, 0xff, 0x6, 0xfd, 0x9, 0x0, 0x2, 0x1128, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x12, 0x3, 0x80, 0x9, 0x0, 0x10001, 0x7}) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) ioctl$HIDIOCGRAWINFO(r3, 0x80084803, &(0x7f0000000100)=""/4096) ioctl$PPPIOCSNPMODE(r0, 0x4008744b, &(0x7f0000001240)={0xc025, 0x2}) 05:17:57 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49007464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:57 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000000)={0xfffffe01, 0x3ff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:57 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r2 = dup(r1) r3 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nvme-fabrics\x00', 0x200000, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r3, 0xc0505405, &(0x7f0000000140)={{0x3, 0x1, 0x1, 0x3, 0x100}, 0x0, 0xffff, 0x7}) ioctl$vim2m_VIDIOC_STREAMOFF(r2, 0x40045612, &(0x7f0000000000)=0x2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = semget$private(0x0, 0x3, 0x0) semop(r5, &(0x7f0000000100)=[{0x2, 0x7}, {0x2}], 0x2) clone(0x20ca200, &(0x7f0000000300)="cce89dc9559ee58b5abcfc4998feb8cb8e572d13c702acecf1ff2b5965b7d469aba6134a001ef18a1a4239ae35506555592afe1b3994bb9a92a15c76fc99f3b66873ab5b82f2c6463bfdc9e8ff10e1d4cfd6f626115da148488d4b38eba4e44b14e6ea9dbbe0fde40907f3727f6554c10a2b002ad0bca743801a3ac403c1ae70ea8157d0bfe1a77ca550bf3b37bf12c6dad9e9c1f6c7281b6a472a32a116c187e4b7f39cdfce3d6bd0a98aa738", &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="513ccb9750c6c7653b2692b0ae9c03fab81760ad37633879e74f444b242d78f78a0ec450d992c0a4202cbe3e67dffa13fb03b86e88b72588cc0a3e67397e3683a216acaf3cab1fa0a436f96d2f0087254e46faf394bbaf4f75b541b7d34f2c6295712bbb1bf27c70b936f87a5b7cde023ce2a4e0c25389ccbb6153d23fda18f9d2b9b92e2e1fd7e357480346b5a6be35c4c97ad34686b9b28ac4a58716c9d2fa5cc0045821541a9cfab3e63799bf0eafc09871ab142d20f497a7") semctl$GETPID(r5, 0x0, 0xb, 0x0) semctl$GETNCNT(r5, 0x1, 0xe, &(0x7f0000000240)=""/149) r6 = dup(r4) setsockopt$packet_int(r6, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r6, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r6, 0x84, 0x1c, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 05:17:57 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e004001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 500.032944][ T3651] semctl(GETNCNT/GETZCNT) is since 3.16 Single Unix Specification compliant. [ 500.032944][ T3651] The task syz-executor.4 (3651) triggered the difference, watch for misbehavior. [ 500.117442][ T3609] affs: No valid root block on device loop2 05:17:57 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa064f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:57 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee0225785ce976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:57 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xe900, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:57 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49008464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 500.473217][ T3669] BTRFS: device fsid 064f85f4-9009-464a-9504-7a7b7f5c247e devid 0 transid 0 /dev/loop5 scanned by syz-executor.5 (3669) 05:17:57 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee0225785ee976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:58 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa074f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:58 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e005c01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 500.728470][ T3679] affs: No valid root block on device loop2 05:17:58 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) poll(&(0x7f0000000000)=[{r2, 0x4040}, {r1, 0x170c}], 0x2, 0x5) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:58 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) dup(r1) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r1}, 0x8) creat(&(0x7f0000000080)='./file1\x00', 0x180) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x2000000400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:58 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f4900a464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:58 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x8400, 0x0) 05:17:58 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0xe2300, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) dup(r2) fsconfig$FSCONFIG_SET_FD(r2, 0x5, &(0x7f0000000000)='\x00', 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400203) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:58 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) r3 = dup(r2) r4 = socket$packet(0x11, 0x3, 0x300) r5 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x20, 0x1f, 0x6, 0xff, 0x0, 0x1c, 0x241f, 0xf, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5e6, 0x1, @perf_bp={&(0x7f0000000100), 0x2}, 0xac, 0x7fffffff, 0x10001, 0x8, 0xf7, 0x8, 0xfffe}, 0x0, 0x1, r0, 0x2) fsetxattr$trusted_overlay_upper(r5, &(0x7f00000001c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0xa3, 0x6, 0x6, "f805b63119b2b7d9ea6b0fa66f9c0a91", "40c0aab5ff26cd73e3f5cea7bba559b8a0050387e5c5229a3c46b0d8ebc2d539e2b5d58431b25e2b5aee9a59da87674916e606f8dcfd9abdc212e8ab3307170d709dee79430a72251848296a711221c7fbfc8f6225f78334cd7167049e9bdc30f2f53a6d889fcc7bbe27c248a1ac4253e085f0579bab85e186d3c1b9e8b56c60ecba8f28391a6c6fe01cf1759a32"}, 0xa3, 0x1) dup(r4) r6 = dup2(r4, r4) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:58 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e95ccb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 500.993939][ T3704] BTRFS: device fsid 074f85f4-9009-464a-9504-7a7b7f5c247e devid 0 transid 0 /dev/loop5 scanned by syz-executor.5 (3704) 05:17:58 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xea00, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:58 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x2000, 0x0) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000000140)=""/5) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x480000, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = dup2(r2, r2) socket$inet_mptcp(0x2, 0x1, 0x106) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) dup(0xffffffffffffffff) accept$inet(r3, &(0x7f0000000180)={0x2, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) r5 = socket$packet(0x11, 0x3, 0x300) dup(r5) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(r5, r5) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) bind$packet(r1, &(0x7f0000000640)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @broadcast}, 0xffffffffffffff33) r8 = dup2(r5, r4) setsockopt$packet_int(r8, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) ioctl$DRM_IOCTL_SWITCH_CTX(r8, 0x40086424, &(0x7f0000000000)={0x0, 0x2}) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:58 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f00000001c0)={"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"}) dup(r3) r4 = dup2(r3, r3) r5 = socket$packet(0x11, 0x3, 0x300) dup(r5) r6 = dup2(r5, r5) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) sendmsg$WG_CMD_SET_DEVICE(r6, &(0x7f0000000680)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x2c, 0x0, 0x4, 0x70bd2b, 0x25dfdbff, {}, [@WGDEVICE_A_FLAGS={0x8, 0x5, 0xa7ef59219f4ba3d7}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e21}, @WGDEVICE_A_IFINDEX={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) setsockopt$packet_int(r4, 0x107, 0x1a, &(0x7f0000000080), 0x4) ioctl$CHAR_RAW_RAGET(r4, 0x1263, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000140)=[&(0x7f0000000180)='\x92\xfer\xf5\t\x1d\xc2\"\f\xe8\x1bg\x1d\xe6]\xe5g\x9eox\x13Z\x1e\xa0\x8f\x83\xb2\xf8Y\x1c\xb1\xc23\xb8g%\x05U\xedh\xf0\xee\xd7', &(0x7f0000000080)='/dev/bsg\x00', &(0x7f0000000100)='/dev/bsg\x00'], 0x0) 05:17:58 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa084f85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:58 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868252450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:58 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = dup2(r1, r1) r3 = dup(r2) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000680020002bbd7000ffdb00004200030800000000040004000c00088005000200ff000000"], 0x28}, 0x1, 0x0, 0x0, 0x90}, 0x20004004) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) execve(&(0x7f0000000080)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:58 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e0fff01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:59 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f4900b464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:59 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x42041, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, &(0x7f0000000100)={0x0, 0xffff, 0x43a00b56, 0x1}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000000500)={r3, "3ed320e94766e2173fa7d2e45ffd5fac"}) r4 = dup2(r1, r1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = dup(r6) setsockopt$packet_int(r7, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r7, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) sendmsg$IPVS_CMD_GET_INFO(r7, &(0x7f0000001580)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000080)={&(0x7f0000001500)={0x6c, 0x0, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5391}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xa50}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xe34}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_AF={0x6}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x40}, 0x4000800) [ 501.676777][ T3760] affs: No valid root block on device loop2 05:17:59 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) r3 = socket$packet(0x11, 0x3, 0x300) dup(r3) r4 = dup2(r3, r3) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000000)="b41b3ecdd8be", 0x6, r4}, 0x68) 05:17:59 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb88685c2450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:59 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7ffffff2, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:17:59 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) write$uinput_user_dev(r2, &(0x7f0000000100)={'syz0\x00', {0x9, 0x1, 0x5, 0x5}, 0x3d, [0xfffffd58, 0x0, 0x7, 0x3ff, 0x0, 0x4537, 0x6, 0xffff, 0x200, 0x8, 0x80000000, 0x17770254, 0x4, 0x3, 0x80000001, 0x9, 0x2, 0x1, 0x3, 0x1, 0x1f, 0x4, 0x400, 0x9, 0x3, 0x6, 0x401, 0x401, 0x4102887, 0x1, 0x48000, 0x3f, 0x5df, 0x1000, 0xcf3, 0x4, 0x6, 0xb975, 0x2, 0x81, 0x1f, 0x4, 0x1, 0x401, 0x7fffffff, 0x3, 0x0, 0x6704e144, 0x3f, 0x8, 0x5, 0x1, 0x1f, 0x4, 0xc355, 0x2, 0x7, 0xb7, 0x4, 0xed36, 0x7, 0x19cc, 0xe6, 0x9], [0x5, 0xcf, 0x1, 0x0, 0xbbf, 0xe93, 0x5, 0x7, 0x9, 0x70, 0x9, 0x0, 0x7, 0x36, 0x10000, 0x4cc1ee43, 0x1, 0x916, 0x80000000, 0x58e, 0x0, 0xf7eb, 0x5, 0xfffffffa, 0x7, 0x80000001, 0x9, 0x5, 0xffff, 0x7, 0x18, 0x7, 0x3, 0x9b69, 0x1, 0x8, 0x0, 0xc60a, 0x401, 0x5, 0x0, 0x3f, 0xf585, 0x0, 0x5, 0xff, 0x400, 0x0, 0x1000, 0x7, 0x1, 0x4, 0x0, 0xa6, 0x4, 0x6, 0x10001, 0xffffffff, 0x5, 0x7f, 0xfffffff9, 0x3, 0x81, 0xbaf], [0x7, 0x1, 0x8001, 0x7b, 0x4, 0x6, 0x0, 0x0, 0x9, 0x7, 0x1, 0xfffff2e6, 0x2, 0x9, 0x3ff, 0x3, 0x1, 0x8, 0x101, 0x7, 0x6, 0x5, 0x2, 0x1f, 0x6, 0x3, 0x80000000, 0x1, 0x5, 0x3, 0x1ff, 0x44f3, 0x10001, 0x6, 0x401, 0x7f, 0xffff, 0x25b, 0x7fffffff, 0x0, 0x0, 0x800, 0x9b06, 0x81, 0x8, 0x6dd2, 0x4, 0x7ff, 0x0, 0x365c, 0xe4f8, 0x8, 0x0, 0x7, 0xfff, 0x2, 0x3f, 0x0, 0x9, 0x1, 0x7, 0x401, 0x8, 0x8], [0x3, 0x6, 0x4, 0x6, 0x1ff, 0x4, 0x0, 0x2f, 0x3, 0x3, 0x1, 0x28, 0x10000, 0x9, 0x2, 0x9, 0x8, 0x401, 0x7, 0x3, 0x7, 0x8, 0x1, 0x2, 0x80000000, 0x7f, 0x7fffffff, 0x0, 0x81, 0x200, 0x7a1e8b28, 0x1, 0x5, 0x4ab, 0xffff, 0x45, 0x1, 0x50, 0x5, 0x9, 0x8, 0x4, 0x100, 0x91b, 0x10000, 0x101, 0x5, 0x7ff, 0x2, 0x12, 0x8, 0x1, 0x9, 0xffffff00, 0x0, 0xfffffff8, 0x4, 0x32fce289, 0x7fff, 0x1, 0x3, 0x3985cb53, 0x6, 0x40]}, 0x45c) r3 = mq_open(&(0x7f0000000000)='./[]\x00', 0x2, 0x1, &(0x7f0000000080)={0x2, 0x9553, 0x7, 0x8000}) dup2(r3, r0) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000000", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 501.936152][ T3786] BTRFS: device fsid 084f85f4-9009-464a-9504-7a7b7f5c247e devid 0 transid 0 /dev/loop5 scanned by syz-executor.5 (3786) 05:17:59 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) r3 = socket$packet(0x11, 0x3, 0x300) r4 = dup(r3) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x82, 0x0) setsockopt$packet_tx_ring(r5, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) pidfd_getfd(r4, r1, 0x0) dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0xe7a) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:59 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa022585f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:59 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f4900c464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:59 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) r3 = socket$packet(0x11, 0x3, 0x300) r4 = dup(r3) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$VIDIOC_ENUMAUDOUT(r4, 0xc0345642, &(0x7f0000000000)={0x5, "31613df664f20cba2f44ec1ff739f65dc0391cab899eadf8fe24deb92db5b216", 0x0, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000000", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000000", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:17:59 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868620850cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 502.416469][ T3838] BTRFS: device fsid 022585f4-9009-464a-9504-7a7b7f5c247e devid 0 transid 0 /dev/loop5 scanned by syz-executor.5 (3838) 05:17:59 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = dup(0xffffffffffffffff) lookup_dcookie(0x2, &(0x7f0000000100)=""/215, 0xd7) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup(r1) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) recvfrom$rxrpc(r2, &(0x7f0000000200)=""/146, 0x92, 0x40, &(0x7f0000000000)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0x64010102}}, 0x24) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:17:59 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f4900d464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:00 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7ffffff8, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:00 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868625e50cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:00 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r0, r1) r3 = syz_open_dev$ptys(0xc, 0x3, 0x1) ioctl$TIOCMBIS(r3, 0x5416, &(0x7f0000000000)=0x9) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mkdir(&(0x7f0000000100)='./file1\x00', 0x1c8) execve(&(0x7f0000000140)='./file1\x00', &(0x7f0000000280), 0x0) 05:18:00 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000000", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:00 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa025e85f49009464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:00 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f4900e464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:00 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f0000000300)={0x8, 0x6, 0x1, {0x5, @win={{0x1f, 0x2, 0x20, 0x4}, 0x0, 0x3, &(0x7f00000001c0)={{0x0, 0x9, 0x4, 0x4}, &(0x7f0000000180)={{0x9, 0xffffff20, 0x1, 0x9}, &(0x7f0000000080)={{0x40, 0x101, 0x5, 0x1}}}}, 0x8, &(0x7f0000000200)="0f945a681b5df7cdb239b6ae55868c2cf0897e7658dc5e877cd5fb48c3e02aecf3b28352d9938d50e20d4879538445f770d7bcfd6d320285d7b6b097c57055b7dc1d815d073731eb0c9491cc9dd2c8a97e4f8d74485e5e8743b3b9f7556eb90b883fd8540985036f0b818052ad1ec79015e258077f19056c4d4ed6e8a7dda1e18a758136270d208175c1244530048006402dc006c44671b2e2ffe0f7a39b18c8f936bba0c82910e2762db3463b58d3823dcee06acbb3d41b6c333fdfad454150a672fd238ff28f38c3b5137af15a31002bfd192fc1a8280554f2f8e5f813b1dc728cff6b6602f6437b6d11a32ea0f3b0d8a395"}}, 0x9}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x4, 0x76, 0x6, 0x6, 0x34, @private1, @rand_addr=' \x01\x00', 0x1, 0x8000, 0x5, 0x8}}) [ 503.014488][ T3880] BTRFS: device fsid 025e85f4-9009-464a-9504-7a7b7f5c247e devid 0 transid 0 /dev/loop5 scanned by syz-executor.5 (3880) 05:18:00 executing program 4: sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1441000}, 0xc, &(0x7f00000005c0)={&(0x7f00000001c0)={0x3d0, 0x0, 0x100, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x400}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x65}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x9}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xffffff80}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK={0x118, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xa41f}]}, @TIPC_NLA_LINK_PROP={0x54, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x85}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xdce2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffd}]}]}, @TIPC_NLA_NODE={0x268, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x41, 0x4, {'gcm(aes)\x00', 0x19, "9a8e4ae723ebcbf5d87e6590632fbe8a86c7cb35d8df10f9a9"}}, @TIPC_NLA_NODE_KEY={0x48, 0x4, {'gcm(aes)\x00', 0x20, "45a56b54cb7e2f51254f73bf2e423f8cdbd591dd728129889d7ab0c99623d7a3"}}, @TIPC_NLA_NODE_ID={0x47, 0x3, "dc7b3c6731361690475afb514c16f798fd8324095ebaadfc396538fc5cd79037067df79234acf5fc74f2d4d0175f7d0901de01b8d5b64c2b5ac19384546ba9b213e693"}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x3c, 0x4, {'gcm(aes)\x00', 0x14, "b75700b3d3ffe9f761273cb7a78f125723a878f9"}}, @TIPC_NLA_NODE_ID={0x102, 0x3, "0208b6c69013d120348933f1d30864bcfc5a8153ea1442ab5626b09596cf665952b35e51ab2ef40f0afbd34c7c38419583f0c016fa39aae2beb614ef786ec5342e1ebd24ebd0625141c7c9b3d307b85793d55f5000677455231e78846852cba33d536786ed647f228a514833f9a7605fa4a524e8b1aedb85101c8c6ee7bc984f4887a97cda9ff10b753c518d02edd41974e8f73e7aac5e32cddb9b17825fe1b26649d5f9dc49f9eeb97c349decac8cddede1a28fc665f13c14b49ca158e2ee69100d3c7681387ea7e823bcca8484cc4b99e331826b787d283af17703b50705183b7eac385dd8a0a0922bc3d3f0ff85c67b42ffcfd40d69e985ad73aa7fe3"}, @TIPC_NLA_NODE_KEY={0x4c, 0x4, {'gcm(aes)\x00', 0x24, "68ef307c567c342ec91acbeb9c0da60fbfd64931a0cc5e97004010b95603609172baf48d"}}]}]}, 0x3d0}, 0x1, 0x0, 0x0, 0x4}, 0x4001) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7fff, 0x200800) fcntl$lock(r1, 0x24, &(0x7f0000000140)={0x0, 0x0, 0x5, 0x2, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$CAIFSO_REQ_PARAM(r1, 0x116, 0x80, &(0x7f0000000640)="33e1726c3222eb6ae6b4ee2c300fb8da4d5774819a412be2a3ac020677c0de780b64f3d58c63075f8b9da5989e650d0e68db010cbf5b2d070f316d15bdd632ebac56e9e52b0fe54b03c61cee208e", 0x4e) r3 = dup2(r2, r2) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) dup3(r0, r4, 0x80000) r5 = socket$packet(0x11, 0x3, 0x300) dup(r5) r6 = dup2(r5, r5) setsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) openat$incfs(r3, &(0x7f0000000700)='.pending_reads\x00', 0x400000, 0x1c9) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r6, 0x10e, 0x4, &(0x7f00000006c0)=0x2, 0x4) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000080)={@multicast1, @multicast2}, &(0x7f0000000100)=0xc) 05:18:00 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x129b02, 0x0) write$vga_arbiter(r0, &(0x7f0000000180)=@other={'trylock', ' ', 'mem'}, 0xc) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) r4 = socket$packet(0x11, 0x3, 0x300) dup(r4) r5 = dup2(r4, r4) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$bt_hci_HCI_DATA_DIR(r5, 0x0, 0x1, &(0x7f0000000000)=0xfae9, 0x4) 05:18:00 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49010464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:00 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x2c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfe, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @remote}, @GTPA_O_TEI={0x8, 0x9, 0x4}, @GTPA_MS_ADDRESS={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x1c}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40000}, 0x20004841) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r1, r1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:18:00 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb886862c050cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:01 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x7ffffff9, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:01 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000300", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:01 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49002464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:01 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) r3 = socket$packet(0x11, 0x3, 0x300) r4 = dup(r3) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) sendmsg$AUDIT_SIGNAL_INFO(r4, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x10, 0x3f2, 0x200, 0x70bd2d, 0x25dfdbfe, "", ["", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x28008080}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r5, 0x80089419, &(0x7f0000000200)) pipe2(&(0x7f0000000000), 0x104800) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:18:01 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49011464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:01 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622425cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:01 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r4, 0x89f0, &(0x7f0000000000)={'bridge0\x00', &(0x7f0000000200)=@ethtool_ringparam={0xe}}) r5 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f00000002c0)=0x8, 0x4) r6 = socket$packet(0x11, 0x3, 0x300) dup(r6) r7 = dup2(r6, r6) setsockopt$packet_int(r7, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) ioctl$LOOP_CLR_FD(r7, 0x4c01) r8 = dup2(0xffffffffffffffff, r0) sendmsg$DCCPDIAG_GETSOCK(r8, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xa4, 0x13, 0x20, 0x70bd2d, 0x25dfdbfc, {0x22, 0x81, 0x80, 0x1, {0x4e23, 0x4e20, [0xfffffff8, 0x4, 0xd715, 0x4], [0x0, 0x6, 0x40, 0x7], 0x0, [0x0, 0x6]}, 0x7, 0x400}, [@INET_DIAG_REQ_BYTECODE={0x29, 0x1, "157d2650d7fd1e4d5820b4aaadae65ed6e881fc2b18111fb17b7b94d268c7fdb4c81142523"}, @INET_DIAG_REQ_BYTECODE={0x2c, 0x1, "69def3ac787a3f80f3edea23d568784eee72ee9b0b3fac52a2dac46a2b95f4ac6430413f59c17fbb"}]}, 0xa4}, 0x1, 0x0, 0x0, 0x40010d5}, 0x20000001) ioctl$TCGETS2(r7, 0x802c542a, &(0x7f0000000280)) [ 504.106694][ T3944] BTRFS: device fsid 024f85f4-9002-464a-9504-7a7b7f5c247e devid 0 transid 0 /dev/loop5 scanned by syz-executor.5 (3944) 05:18:01 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) r2 = dup(r1) r3 = socket$packet(0x11, 0x3, 0x300) r4 = dup(r3) setsockopt$packet_int(r4, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x82, 0x0) setsockopt$packet_tx_ring(r5, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) pidfd_getfd(r4, r1, 0x0) dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0xe7a) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:18:01 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49012464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:01 executing program 4: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x8b00, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:01 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000400", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:01 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb886862245ecfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:02 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff, &(0x7f0000000300)=[{0x0, 0x0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:02 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49003464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:02 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f490095e4a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:02 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfeec0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000800", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:02 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$USBDEVFS_CLAIMINTERFACE(r0, 0x8004550f, &(0x7f0000000000)=0x6) r2 = dup2(r1, r1) dup(r2) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) dup(r4) r5 = dup2(r4, r4) setsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0xb0700, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r6, 0x84, 0x6c, &(0x7f00000002c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="c1000000378a8eca16c037bb7363966b13811e34a34aaef38c2f2dc417fda5918f9b5eb3bff79cc7839677cd5589a22b406d8574bbc58597fc88ecd3d73542fdd824e1674501812291d09ba73f2e5873f6cdeb0df29907bbf437d68cf00dc4f00000000007a5bb510acd1e07013b8ae8e9f875d7b5def7c58da5301e980404e04901fd95cb10917814b0107cdd01512336cdf9a56b373479dde8ad36df6d649973bb76ad07000000000000008a0cbb7dedacf6b9c16a4c3761af026dcb681a0b8800000000b739fa3eade875f935503192512b04260b412a5a4e86fff0ee2e56c31b5fc8c2853ec975456f55aff4053d08a3a202"], &(0x7f0000000240)=0xc9) ioctl$VIDIOC_LOG_STATUS(r5, 0x5646, 0x0) dup(r3) r7 = dup2(r3, r3) setsockopt$packet_int(r7, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) ioctl$SG_GET_NUM_WAITING(r7, 0x227d, &(0x7f0000000080)) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) bind$rose(0xffffffffffffffff, &(0x7f0000000280)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x1, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @bcast, @bcast, @default, @default]}, 0x40) 05:18:02 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bsg\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) dup(r1) r2 = socket$packet(0x11, 0x3, 0x300) r3 = dup(r2) setsockopt$packet_int(r3, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x40000008, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) execve(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000040), 0x0) 05:18:02 executing program 4 (fault-call:5 fault-nth:0): open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:02 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) [ 505.130573][ T4000] BTRFS: device fsid 024f85f4-9003-464a-9504-7a7b7f5c247e devid 0 transid 0 /dev/loop5 scanned by syz-executor.5 (4000) 05:18:02 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009462595047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:02 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x02\x00\x00\x00\x00'], 0x0) 05:18:02 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x03\x00\x00\x00\x00'], 0x0) 05:18:03 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x2, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:03 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfef24901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:03 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e007000", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:03 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49004464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:03 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x04\x00\x00\x00\x00'], 0x0) 05:18:03 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009465e95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:03 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x05\x00\x00\x00\x00'], 0x0) [ 506.062913][ T4064] BTRFS: device fsid 024f85f4-9004-464a-9504-7a7b7f5c247e devid 0 transid 0 /dev/loop5 scanned by syz-executor.5 (4064) [ 506.078573][ T4074] affs: No valid root block on device loop2 05:18:03 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000201", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:03 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49005464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:03 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95027a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:03 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x06\x00\x00\x00\x00'], 0x0) 05:18:03 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x3, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:03 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfef9f901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:03 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\a\x00\x00\x00\x00'], 0x0) 05:18:03 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\b\x00\x00\x00\x00'], 0x0) 05:18:03 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\t\x00\x00\x00\x00'], 0x0) [ 506.367869][ T4107] BTRFS: device fsid 024f85f4-9005-464a-9504-7a7b7f5c247e devid 0 transid 0 /dev/loop5 scanned by syz-executor.5 (4107) 05:18:03 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\n\x00\x00\x00\x00'], 0x0) 05:18:03 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49006464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 506.452010][ T4150] affs: No valid root block on device loop2 05:18:03 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa034f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:03 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000301", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:03 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95037a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:03 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x4, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:04 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\v\x00\x00\x00\x00'], 0x0) 05:18:04 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\f\x00\x00\x00\x00'], 0x0) 05:18:04 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\r\x00\x00\x00\x00'], 0x0) 05:18:04 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x0e\x00\x00\x00\x00'], 0x0) 05:18:04 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95057a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 506.808921][ T4183] BTRFS: device fsid 024f85f4-9006-464a-9504-7a7b7f5c247e devid 0 transid 0 /dev/loop5 scanned by syz-executor.5 (4183) 05:18:04 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x10\x00\x00\x00\x00'], 0x0) 05:18:04 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000401", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:04 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49007464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 506.891358][ T4230] affs: No valid root block on device loop2 05:18:04 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa044f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:04 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x11\x00\x00\x00\x00'], 0x0) 05:18:04 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x5, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:04 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x12\x00\x00\x00\x00'], 0x0) 05:18:04 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x18\x00\x00\x00\x00'], 0x0) 05:18:04 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95067a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:04 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='#\x00\x00\x00\x00'], 0x0) [ 507.232323][ T4268] BTRFS: device fsid 024f85f4-9007-464a-9504-7a7b7f5c247e devid 0 transid 0 /dev/loop5 scanned by syz-executor.5 (4268) [ 507.306139][ T4310] affs: No valid root block on device loop2 05:18:04 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='%\x00\x00\x00\x00'], 0x0) 05:18:04 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49008464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:04 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000501", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:04 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa054f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:04 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='H\x00\x00\x00\x00'], 0x0) 05:18:04 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x6, 0xd2bd}], 0x0, &(0x7f00000001c0)) [ 507.473999][ T4310] affs: No valid root block on device loop2 05:18:04 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='L\x00\x00\x00\x00'], 0x0) 05:18:04 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95077a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:05 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\\\x00\x00\x00\x00'], 0x0) [ 507.696940][ T4359] BTRFS: device fsid 024f85f4-9008-464a-9504-7a7b7f5c247e devid 0 transid 0 /dev/loop5 scanned by syz-executor.5 (4359) [ 507.710943][ T4382] affs: No valid root block on device loop2 05:18:05 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='h\x00\x00\x00\x00'], 0x0) 05:18:05 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='l\x00\x00\x00\x00'], 0x0) 05:18:05 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000601", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:05 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa064f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:05 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f4900a464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95087a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 507.891207][ T4382] affs: No valid root block on device loop2 05:18:05 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='t\x00\x00\x00\x00'], 0x0) 05:18:05 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='z\x00\x00\x00\x00'], 0x0) 05:18:05 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x7, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:05 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\xef\x00\x00\x00\x00'], 0x0) 05:18:05 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x03\x00\x00\x00'], 0x0) 05:18:05 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x05\x00\x00\x00'], 0x0) [ 508.260536][ T4451] BTRFS: device fsid 024f85f4-900a-464a-9504-7a7b7f5c247e devid 0 transid 0 /dev/loop5 scanned by syz-executor.5 (4451) 05:18:05 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x06\x00\x00\x00'], 0x0) 05:18:05 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\a\x00\x00\x00'], 0x0) [ 508.414125][ T4484] affs: No valid root block on device loop2 05:18:05 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\t\x00\x00\x00'], 0x0) 05:18:05 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa074f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:06 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f4900b464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:06 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000701", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95097a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:06 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\n\x00\x00\x00'], 0x0) 05:18:06 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x8, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:06 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\v\x00\x00\x00'], 0x0) 05:18:06 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\f\x00\x00\x00'], 0x0) 05:18:06 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\r\x00\x00\x00'], 0x0) [ 508.847435][ T4563] BTRFS: device fsid 024f85f4-900b-464a-9504-7a7b7f5c247e devid 0 transid 0 /dev/loop5 scanned by syz-executor.5 (4563) [ 508.862976][ T4564] affs: No valid root block on device loop2 05:18:06 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x0e\x00\x00\x00'], 0x0) 05:18:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a950a7a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:06 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000801", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:06 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa084f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 509.019983][ T4564] affs: No valid root block on device loop2 05:18:06 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f4900c464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:06 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x11\x00\x00\x00'], 0x0) 05:18:06 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x9, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:06 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x12\x00\x00\x00'], 0x0) 05:18:06 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x18\x00\x00\x00'], 0x0) 05:18:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a950b7a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 509.350103][ T4626] affs: No valid root block on device loop2 05:18:06 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000901", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:06 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00 \x00\x00\x00'], 0x0) [ 509.451039][ T4641] BTRFS: device fsid 024f85f4-900c-464a-9504-7a7b7f5c247e devid 0 transid 0 /dev/loop5 scanned by syz-executor.5 (4641) 05:18:06 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00#\x00\x00\x00'], 0x0) 05:18:06 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa0f4f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 509.514161][ T4626] affs: No valid root block on device loop2 05:18:07 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00%\x00\x00\x00'], 0x0) 05:18:07 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00H\x00\x00\x00'], 0x0) 05:18:07 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f4900d464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:07 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00L\x00\x00\x00'], 0x0) 05:18:07 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0xa, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a950c7a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000a01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:07 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa022585f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:07 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\\\x00\x00\x00'], 0x0) 05:18:07 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00h\x00\x00\x00'], 0x0) 05:18:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a950d7a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:07 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa025e85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000b01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 510.177922][ T4717] affs: No valid root block on device loop2 05:18:07 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00l\x00\x00\x00'], 0x0) [ 510.364886][ T4717] affs: No valid root block on device loop2 [ 510.378601][ T4740] BTRFS: device fsid 024f85f4-900d-464a-9504-7a7b7f5c247e devid 0 transid 0 /dev/loop5 scanned by syz-executor.5 (4740) 05:18:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f4900e464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:08 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00t\x00\x00\x00'], 0x0) 05:18:08 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0xb, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a950e7a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:08 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49002464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:08 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000c01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:08 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00z\x00\x00\x00'], 0x0) 05:18:08 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\xff\xef\x00\x00\x00'], 0x0) [ 510.883052][ T4793] affs: No valid root block on device loop2 [ 510.910158][ T4828] BTRFS: device fsid 024f85f4-900e-464a-9504-7a7b7f5c247e devid 0 transid 0 /dev/loop5 scanned by syz-executor.5 (4828) 05:18:08 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\xef\xff\x00\x00\x00'], 0x0) 05:18:08 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49003464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:08 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x80Q\x01\x00\x00'], 0x0) 05:18:08 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x02\x00\x00'], 0x0) [ 511.110899][ T4793] affs: No valid root block on device loop2 05:18:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49010464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:08 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0xc, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:08 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000d01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:08 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x10\x00\x00'], 0x0) 05:18:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95107a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:08 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00 \x00\x00'], 0x0) 05:18:08 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49004464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:08 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x808-\x00\x00'], 0x0) [ 511.523390][ T4906] affs: No valid root block on device loop2 05:18:09 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\xe08-\x00\x00'], 0x0) 05:18:09 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)=' 9-\x00\x00'], 0x0) 05:18:09 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)=' ;-\x00\x00'], 0x0) 05:18:09 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x80;-\x00\x00'], 0x0) [ 511.797031][ T4906] affs: No valid root block on device loop2 [ 511.814626][ T4909] BTRFS: device fsid 024f85f4-9010-464a-9504-7a7b7f5c247e devid 0 transid 0 /dev/loop5 scanned by syz-executor.5 (4909) 05:18:09 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49011464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:09 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000e01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95117a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:09 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x01\x00'], 0x0) 05:18:09 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49005464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:09 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0xd, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:09 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x02\x00'], 0x0) 05:18:09 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x03\x00'], 0x0) 05:18:09 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x04\x00'], 0x0) [ 512.144509][ T5007] affs: No valid root block on device loop2 05:18:09 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x05\x00'], 0x0) 05:18:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95127a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:09 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000f01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 512.310028][ T5007] affs: No valid root block on device loop2 [ 512.352021][ T5009] BTRFS: device fsid 024f85f4-9011-464a-9504-7a7b7f5c247e devid 0 transid 0 /dev/loop5 scanned by syz-executor.5 (5009) 05:18:10 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49012464a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:10 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x06\x00'], 0x0) 05:18:10 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0xe, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:10 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49006464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:10 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e001001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:10 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x96\xd0.\x06\x00'], 0x0) 05:18:10 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\a\x00'], 0x0) [ 512.809225][ T5072] affs: No valid root block on device loop2 05:18:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95045c7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 512.870111][ T5081] BTRFS: device fsid 024f85f4-9012-464a-9504-7a7b7f5c247e devid 0 transid 0 /dev/loop5 scanned by syz-executor.5 (5081) 05:18:10 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0xf, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:10 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49007464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:10 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\b\x00'], 0x0) 05:18:10 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\t\x00'], 0x0) [ 513.064059][ T5114] affs: No valid root block on device loop2 05:18:10 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f490095c4a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:10 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\n\x00'], 0x0) 05:18:10 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x10, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:10 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e001101", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 513.195759][ T5114] affs: No valid root block on device loop2 05:18:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c087e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:10 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\v\x00'], 0x0) 05:18:10 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\f\x00'], 0x0) 05:18:10 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49008464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:10 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\r\x00'], 0x0) 05:18:10 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x0e\x00'], 0x0) 05:18:10 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\xbd\xd1\n\x0e\x00'], 0x0) 05:18:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e001201", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 513.573504][ T5190] BTRFS: device fsid 024f85f4-9009-5c4a-9504-7a7b7f5c247e devid 0 transid 0 /dev/loop5 scanned by syz-executor.5 (5190) [ 513.594472][ T5181] affs: No valid root block on device loop2 05:18:11 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f490095e4a95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:11 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x11, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:11 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x10\x00'], 0x0) 05:18:11 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f4900a464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5cc07e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:11 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x11\x00'], 0x0) 05:18:11 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x12\x00'], 0x0) [ 513.993270][ T5230] affs: No valid root block on device loop2 05:18:11 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x18\x00'], 0x0) 05:18:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e002501", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:11 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='m\xb6\b\x18\x00'], 0x0) [ 514.139196][ T5253] BTRFS: device fsid 024f85f4-9009-5e4a-9504-7a7b7f5c247e devid 0 transid 0 /dev/loop5 scanned by syz-executor.5 (5253) 05:18:11 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\xbe9,\x1b\x00'], 0x0) 05:18:11 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x12, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:11 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009462595047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e020001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:11 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\xe4\x062\x1d\x00'], 0x0) 05:18:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e005c01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:11 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f4900b464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:11 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='9\xc5f\x1d\x00'], 0x0) 05:18:11 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00 \x00'], 0x0) 05:18:11 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00-9 \x00'], 0x0) [ 514.521800][ T5306] affs: No valid root block on device loop2 05:18:12 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00-; \x00'], 0x0) 05:18:12 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\xec\x9bW \x00'], 0x0) [ 514.702491][ T5340] BTRFS: device fsid 024f85f4-9009-4625-9504-7a7b7f5c247e devid 0 transid 0 /dev/loop5 scanned by syz-executor.5 (5340) 05:18:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e030001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 514.844595][ T5306] affs: No valid root block on device loop2 05:18:12 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x25, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000003", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:12 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f4900c464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e040001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:12 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009465e95047a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:12 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00#\x00'], 0x0) 05:18:12 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\xe6\x1dr#\x00'], 0x0) 05:18:12 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x92r\x9b#\x00'], 0x0) 05:18:12 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00%\x00'], 0x0) 05:18:12 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='b d\'\x00'], 0x0) 05:18:12 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='C\xed\xd0.\x00'], 0x0) [ 515.158525][ T5410] BTRFS: device fsid 024f85f4-9009-465e-9504-7a7b7f5c247e devid 0 transid 0 /dev/loop5 scanned by syz-executor.5 (5410) 05:18:12 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\xd7\x17\xa90\x00'], 0x0) [ 515.295982][ T5432] affs: No valid root block on device loop2 [ 515.499727][ T5432] affs: No valid root block on device loop2 05:18:12 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x48, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e050001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:12 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f4900d464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000005", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:12 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95027a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:12 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x9a\xf3\xb87\x00'], 0x0) 05:18:13 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x1df\xc59\x00'], 0x0) 05:18:13 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='v\xbb\x8e:\x00'], 0x0) 05:18:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e00000b", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:13 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='c\xac\xb5<\x00'], 0x0) [ 515.753727][ T5485] BTRFS: device fsid 024f85f4-9009-464a-9502-7a7b7f5c247e devid 0 transid 0 /dev/loop5 scanned by syz-executor.5 (5485) [ 515.773079][ T5487] affs: No valid root block on device loop2 05:18:13 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x89\x06\xc9>\x00'], 0x0) 05:18:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e060001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 515.963472][ T5487] affs: No valid root block on device loop2 05:18:13 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x49, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:13 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='.\xd0\xedC\x00'], 0x0) 05:18:13 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f4900e464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e00000f", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:13 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95037a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:13 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00H\x00'], 0x0) 05:18:13 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x91A\xf7H\x00'], 0x0) [ 516.266693][ T5558] affs: No valid root block on device loop2 05:18:13 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00L\x00'], 0x0) 05:18:13 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='Ok\xd1M\x00'], 0x0) 05:18:13 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x4c, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:13 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x82\xc8ZN\x00'], 0x0) 05:18:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e070001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:13 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49010464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:13 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='M\xd1kO\x00'], 0x0) [ 516.592621][ T5595] BTRFS: device fsid 024f85f4-9009-464a-9503-7a7b7f5c247e devid 0 transid 0 /dev/loop5 scanned by syz-executor.5 (5595) [ 516.627242][ T5615] affs: No valid root block on device loop2 05:18:14 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x94\'\x1cX\x00'], 0x0) 05:18:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e00003f", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 516.822544][ T5615] affs: No valid root block on device loop2 05:18:14 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95057a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:14 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\\\x00'], 0x0) 05:18:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e080001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000002", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:14 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x5c, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:14 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49011464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:14 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='p\xb7\xe2\\\x00'], 0x0) [ 517.104641][ T5662] affs: No valid root block on device loop2 05:18:14 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x9f\xa8Pa\x00'], 0x0) 05:18:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000003", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:14 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\'d b\x00'], 0x0) 05:18:14 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='<\xb5\xacc\x00'], 0x0) [ 517.296860][ T5662] affs: No valid root block on device loop2 [ 517.334032][ T5676] BTRFS: device fsid 024f85f4-9009-464a-9505-7a7b7f5c247e devid 0 transid 0 /dev/loop5 scanned by syz-executor.5 (5676) 05:18:14 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x60, 0xd2bd}], 0x0, &(0x7f00000001c0)) [ 517.615856][ T5737] affs: No valid root block on device loop2 05:18:15 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95067a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:15 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\xc9\x9c\x14d\x00'], 0x0) 05:18:15 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49012464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e090001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000004", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:15 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\xeaJte\x00'], 0x0) 05:18:15 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009462595047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 517.948001][ T5737] affs: No valid root block on device loop2 05:18:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e0a0001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:15 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00h\x00'], 0x0) 05:18:15 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x68, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:15 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\xf7*\xb1i\x00'], 0x0) 05:18:15 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x8d\xe4\xbbk\x00'], 0x0) [ 518.182734][ T5777] BTRFS: device fsid 024f85f4-9009-464a-9506-7a7b7f5c247e devid 0 transid 0 /dev/loop5 scanned by syz-executor.5 (5777) 05:18:15 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95077a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:15 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009465e95047a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000005", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:15 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00l\x00'], 0x0) 05:18:15 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x6c, 0xd2bd}], 0x0, &(0x7f00000001c0)) [ 518.348839][ T5808] affs: No valid root block on device loop2 05:18:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e0b0001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:15 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x18\b\xb6m\x00'], 0x0) 05:18:15 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95027a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 518.564461][ T5842] affs: No valid root block on device loop2 05:18:16 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x74, 0xd2bd}], 0x0, &(0x7f00000001c0)) [ 518.604255][ T5847] BTRFS: device fsid 024f85f4-9009-464a-9507-7a7b7f5c247e devid 0 transid 0 /dev/loop5 scanned by syz-executor.5 (5847) 05:18:16 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\\\xe2\xb7p\x00'], 0x0) 05:18:16 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00t\x00'], 0x0) 05:18:16 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)=':\x8e\xbbv\x00'], 0x0) [ 518.863412][ T5880] affs: No valid root block on device loop2 05:18:16 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95087a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000008", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:16 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x86\x13\xa3w\x00'], 0x0) 05:18:16 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95037a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:16 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e0c0001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:16 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00z\x00'], 0x0) 05:18:16 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00-8\x80\x00'], 0x0) [ 519.114420][ T5880] affs: No valid root block on device loop2 05:18:16 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x7a, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:16 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00-;\x80\x00'], 0x0) [ 519.282280][ T5931] BTRFS: device fsid 024f85f4-9009-464a-9508-7a7b7f5c247e devid 0 transid 0 /dev/loop5 scanned by syz-executor.5 (5931) 05:18:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e00000b", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:16 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95057a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:16 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e0d0001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 519.414719][ T5951] affs: No valid root block on device loop2 [ 519.555449][ T5951] affs: No valid root block on device loop2 05:18:17 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95097a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:17 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x01Q\x80\x00'], 0x0) 05:18:17 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x7f\x80\x00'], 0x0) 05:18:17 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95067a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:17 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='NZ\xc8\x82\x00'], 0x0) 05:18:17 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='w\xa3\x13\x86\x00'], 0x0) 05:18:17 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x10e, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e00000f", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:17 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e0e0001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:17 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x91\xafY\x87\x00'], 0x0) 05:18:17 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='>\xc9\x06\x89\x00'], 0x0) [ 519.998200][ T6018] BTRFS: device fsid 024f85f4-9009-464a-9509-7a7b7f5c247e devid 0 transid 0 /dev/loop5 scanned by syz-executor.5 (6018) [ 520.012450][ T6016] affs: No valid root block on device loop2 05:18:17 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\xfd\xa7h\x8a\x00'], 0x0) 05:18:17 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a950a7a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:17 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95077a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:17 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e0f0001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 520.145226][ T6016] affs: No valid root block on device loop2 05:18:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000000", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:17 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x204, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:17 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\xff\xff\xff\x8c\x00'], 0x0) 05:18:17 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\xb5\x1e\xb6\x8d\x00'], 0x0) 05:18:17 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='k\xbb\xe4\x8d\x00'], 0x0) 05:18:17 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='H\xf7A\x91\x00'], 0x0) 05:18:17 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x87Y\xaf\x91\x00'], 0x0) [ 520.513914][ T6069] BTRFS: device fsid 024f85f4-9009-464a-950a-7a7b7f5c247e devid 0 transid 0 /dev/loop5 scanned by syz-executor.5 (6069) [ 520.517370][ T6109] affs: No valid root block on device loop2 05:18:18 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='#\x9br\x92\x00'], 0x0) 05:18:18 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a950b7a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000000", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 520.642511][ T6109] affs: No valid root block on device loop2 05:18:18 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95087a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:18 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\xba\v\xe1\x92\x00'], 0x0) 05:18:18 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e100001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:18 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x300, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:18 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='X\x1c\'\x94\x00'], 0x0) 05:18:18 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x06.\xd0\x96\x00'], 0x0) 05:18:18 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='7\xb8\xf3\x9a\x00'], 0x0) 05:18:18 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='aP\xa8\x9f\x00'], 0x0) 05:18:18 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\xe0\xb9\xb3\xad\x00'], 0x0) [ 520.983455][ T6141] BTRFS: device fsid 024f85f4-9009-464a-950b-7a7b7f5c247e devid 0 transid 0 /dev/loop5 scanned by syz-executor.5 (6141) 05:18:18 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\xc5\xd3G\xae\x00'], 0x0) [ 521.141552][ T6191] affs: No valid root block on device loop2 05:18:18 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a950c7a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:18 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95097a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:18 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e110001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:18 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\xb4\xcfW\xb0\x00'], 0x0) 05:18:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10002}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:18 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x402, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:18 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\xb9^\xb4\xb4\x00'], 0x0) [ 521.420138][ T6233] BTRFS: device fsid 024f85f4-9009-464a-950c-7a7b7f5c247e devid 0 transid 0 /dev/loop5 scanned by syz-executor.5 (6233) 05:18:18 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\xb0W\xcf\xb4\x00'], 0x0) 05:18:18 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a950a7a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:19 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x8d\xb6\x1e\xb5\x00'], 0x0) [ 521.553508][ T6250] affs: No valid root block on device loop2 05:18:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e120001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:19 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\xb4\xb4^\xb9\x00'], 0x0) 05:18:19 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a950d7a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10003}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:19 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x406, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:19 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x92\xe1\v\xba\x00'], 0x0) [ 521.794679][ T6283] BTRFS: device fsid 024f85f4-9009-464a-950d-7a7b7f5c247e devid 0 transid 0 /dev/loop5 scanned by syz-executor.5 (6283) 05:18:19 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a950b7a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:19 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\xd3|\xee\xbb\x00'], 0x0) 05:18:19 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x0e\n\xd1\xbd\x00'], 0x0) [ 521.925196][ T6305] affs: No valid root block on device loop2 05:18:19 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x1b,9\xbe\x00'], 0x0) 05:18:19 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a950e7a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:19 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\xf5\x93\xa4\xc5\x00'], 0x0) 05:18:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e250001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:19 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\xaeG\xd3\xc5\x00'], 0x0) [ 522.155254][ T6305] affs: No valid root block on device loop2 05:18:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10004}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:19 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x500, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:19 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='d\x14\x9c\xc9\x00'], 0x0) [ 522.206459][ T6354] BTRFS: device fsid 024f85f4-9009-464a-950e-7a7b7f5c247e devid 0 transid 0 /dev/loop5 scanned by syz-executor.5 (6354) 05:18:19 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\xbb\xee|\xd3\x00'], 0x0) 05:18:19 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a950c7a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:19 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\xdb\x1e\xdd\xd6\x00'], 0x0) [ 522.434137][ T6395] affs: No valid root block on device loop2 05:18:19 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a950f7a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10005}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e480001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:19 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a950d7a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:20 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='0\xa9\x17\xd7\x00'], 0x0) 05:18:20 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\xd6\xdd\x1e\xdb\x00'], 0x0) 05:18:20 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00-8\xe0\x00'], 0x0) 05:18:20 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x600, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:20 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\xad\xb3\xb9\xe0\x00'], 0x0) 05:18:20 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x1d2\x06\xe4\x00'], 0x0) [ 522.835628][ T6450] BTRFS: device fsid 024f85f4-9009-464a-950f-7a7b7f5c247e devid 0 transid 0 /dev/loop5 scanned by syz-executor.5 (6450) [ 522.853329][ T6467] affs: No valid root block on device loop2 05:18:20 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x604, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:20 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95107a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:20 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e4c0001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10006}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:20 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a950e7a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:20 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='#r\x1d\xe6\x00'], 0x0) 05:18:20 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x700, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:20 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='etJ\xea\x00'], 0x0) 05:18:20 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)=' W\x9b\xec\x00'], 0x0) 05:18:20 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\xff\xff\xff\xef\x00'], 0x0) 05:18:20 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\xc5\xa4\x93\xf5\x00'], 0x0) [ 523.242017][ T6521] affs: No valid root block on device loop2 [ 523.272473][ T6493] BTRFS: device fsid 024f85f4-9009-464a-9510-7a7b7f5c247e devid 0 transid 0 /dev/loop5 scanned by syz-executor.5 (6493) 05:18:20 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\xff\xff\xff\xf6\x00'], 0x0) 05:18:20 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95107a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 523.375456][ T6521] affs: No valid root block on device loop2 05:18:21 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95117a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:21 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e5c0001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10007}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:21 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='i\xb1*\xf7\x00'], 0x0) 05:18:21 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x900, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:21 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x8ah\xa7\xfd\x00'], 0x0) 05:18:21 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\xff\xff\xff\xfe\x00'], 0x0) 05:18:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10008}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:21 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95117a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:21 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x7f\xff\xff\xff\x00'], 0x0) 05:18:21 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x8c\xff\xff\xff\x00'], 0x0) [ 523.884435][ T6601] affs: No valid root block on device loop2 [ 523.894637][ T6600] BTRFS: device fsid 024f85f4-9009-464a-9511-7a7b7f5c247e devid 0 transid 0 /dev/loop5 scanned by syz-executor.5 (6600) 05:18:21 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\xef\xff\xff\xff\x00'], 0x0) [ 524.083581][ T6601] affs: No valid root block on device loop2 05:18:21 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95127a7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:21 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\xf6\xff\xff\xff\x00'], 0x0) 05:18:21 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e680001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:21 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0xa00, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10009}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:21 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\xfe\xff\xff\xff\x00'], 0x0) 05:18:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x1000a}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:21 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e6c0001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:21 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95127a7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:21 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x7f\xff\xc0'], 0x0) [ 524.451819][ T6685] BTRFS: device fsid 024f85f4-9009-464a-9512-7a7b7f5c247e devid 0 transid 0 /dev/loop5 scanned by syz-executor.5 (6685) 05:18:21 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:22 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\xf0\xff\xff\xff'], 0x0) 05:18:22 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95045c7b7f5c247e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:22 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x10`\x8f\xd4\x7f'], 0x0) [ 524.636450][ T6689] affs: No valid root block on device loop2 05:18:22 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x80'], 0x0) [ 524.812034][ T6725] BTRFS: device fsid 024f85f4-9009-464a-9504-5c7b7f5c247e devid 0 transid 0 /dev/loop5 scanned by syz-executor.5 (6725) [ 524.830657][ T6689] affs: No valid root block on device loop2 05:18:22 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0xb00, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:22 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e740001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:22 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\xc0\xff'], 0x0) 05:18:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x1000b}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:22 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c087e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:22 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95045c7b7f5c247e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:22 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\xe0\xff\xff'], 0x0) [ 525.176375][ T6768] affs: No valid root block on device loop2 05:18:22 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\xe0\xef\xff\xff'], 0x0) 05:18:22 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\xe0\xff\xff\xff'], 0x0) 05:18:22 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e7a0001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 525.334579][ T6785] BTRFS: device fsid 024f85f4-9009-464a-9504-7a7b7f5c087e devid 0 transid 0 /dev/loop5 scanned by syz-executor.5 (6785) [ 525.348437][ T6768] affs: No valid root block on device loop2 05:18:22 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x7f\xff\xff'], 0x0) 05:18:22 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0xc00, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:22 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:22 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:22 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) [ 525.533943][ T6840] affs: No valid root block on device loop2 05:18:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x1000c}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:23 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:23 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c087e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:23 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5cc07e000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:23 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e040201", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:23 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0xd00, 0xd2bd}], 0x0, &(0x7f00000001c0)) [ 525.826895][ T6840] affs: No valid root block on device loop2 05:18:23 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x7f\xff\xff'], 0x0) 05:18:23 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x7f\xff\xff'], 0x0) 05:18:23 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x0f\xff\xff'], 0x0) 05:18:23 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) [ 526.114981][ T6877] BTRFS: device fsid 024f85f4-9009-464a-9504-7a7b7f5cc07e devid 0 transid 0 /dev/loop5 scanned by syz-executor.5 (6877) [ 526.175979][ T6903] affs: No valid root block on device loop2 05:18:23 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:23 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0xe00, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x1000d}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:23 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000301", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:23 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:23 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c5e7e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:23 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e020001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:23 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:24 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:24 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) [ 526.665399][ T6951] affs: No valid root block on device loop2 05:18:24 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e020401", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:24 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) [ 526.805411][ T6951] affs: No valid root block on device loop2 05:18:24 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e030001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:24 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0xe01, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:24 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:24 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x1000e}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:24 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:24 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5cc07e000001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:24 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:24 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:24 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) [ 527.306744][ T7053] affs: No valid root block on device loop2 05:18:24 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:24 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e060401", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:24 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:24 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e040001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 527.491509][ T7053] affs: No valid root block on device loop2 05:18:25 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0xf00, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:25 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\xff\xff\xff\xff\xff'], 0x0) 05:18:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x1000f}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:25 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e020001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:25 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:25 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00w\x7f\xd4'], 0x0) 05:18:25 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:25 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000501", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:25 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:25 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e050001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:25 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000601", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:25 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e030001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 528.123400][ T7169] affs: No valid root block on device loop2 [ 528.324482][ T7169] affs: No valid root block on device loop2 05:18:25 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x1020, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:25 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10010}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:25 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e060001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:25 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e040601", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:26 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e040001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:26 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\xbe'], 0x0) 05:18:26 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x009'], 0x0) 05:18:26 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) [ 528.734906][ T7228] affs: No valid root block on device loop2 05:18:26 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:26 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e050001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:26 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e070001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:26 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x1100, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:26 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10011}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:26 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000701", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:26 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) [ 529.167235][ T7300] affs: No valid root block on device loop2 05:18:26 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00b'], 0x0) 05:18:26 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e060001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:26 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x9a'], 0x0) [ 529.405568][ T7300] affs: No valid root block on device loop2 05:18:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10012}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:26 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000901", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:26 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e080001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:26 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x1200, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:26 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x89'], 0x0) 05:18:26 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e070001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:27 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00.'], 0x0) 05:18:27 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:27 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e090001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:27 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10025}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:27 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x91'], 0x0) 05:18:27 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) [ 529.846854][ T7391] affs: No valid root block on device loop2 05:18:27 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00O'], 0x0) 05:18:27 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000a01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:27 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) [ 530.022154][ T7391] affs: No valid root block on device loop2 05:18:27 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x1317, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:27 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e0a0001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:27 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e080001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:27 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x1005c}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:27 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00<'], 0x0) 05:18:27 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:27 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:27 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x18'], 0x0) 05:18:27 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\\'], 0x0) 05:18:27 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e0b0001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 530.469572][ T7483] affs: No valid root block on device loop2 05:18:28 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000b01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:28 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e090001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10204}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:28 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:28 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x1713, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e0c0001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:28 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00:'], 0x0) 05:18:28 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x86'], 0x0) [ 530.823620][ T7538] affs: No valid root block on device loop2 05:18:28 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:28 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000c01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e0d0001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:28 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:28 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e0a0001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:28 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) [ 531.135339][ T7538] affs: No valid root block on device loop2 05:18:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10300}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:28 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:28 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x2000, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:28 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:28 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00N'], 0x0) 05:18:28 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x91'], 0x0) 05:18:28 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000d01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e0e0001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10402}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:28 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e0b0001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:28 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\xff'], 0x0) [ 531.659700][ T7654] affs: No valid root block on device loop2 05:18:29 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000e01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:29 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e0c0001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10406}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:29 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e0f0001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:29 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x2010, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:29 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\xb5'], 0x0) 05:18:29 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00k'], 0x0) 05:18:29 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00#'], 0x0) 05:18:29 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\xba'], 0x0) 05:18:29 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00X'], 0x0) 05:18:29 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x2500, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:29 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x06'], 0x0) [ 532.119108][ T7715] affs: No valid root block on device loop2 05:18:29 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000f01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:29 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e0d0001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:29 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00a'], 0x0) 05:18:29 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e100001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10500}], 0x0, &(0x7f0000000040)=ANY=[]) [ 532.390688][ T7760] affs: No valid root block on device loop2 05:18:29 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x3f00, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:29 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\xc5'], 0x0) 05:18:29 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\xb9'], 0x0) 05:18:30 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\xb0'], 0x0) 05:18:30 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\xd3'], 0x0) 05:18:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10600}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:30 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x0e'], 0x0) [ 532.804006][ T7808] affs: No valid root block on device loop2 05:18:30 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e201001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:30 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e0e0001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:30 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00d'], 0x0) 05:18:30 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e110001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:30 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x000'], 0x0) [ 532.948074][ T7808] affs: No valid root block on device loop2 05:18:30 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x4000, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:30 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\xd6'], 0x0) 05:18:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10604}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:30 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e0f0001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:30 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:30 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\xad'], 0x0) 05:18:30 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x1d'], 0x0) 05:18:30 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e001101", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:30 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00#'], 0x0) 05:18:30 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00e'], 0x0) [ 533.446635][ T7891] affs: No valid root block on device loop2 05:18:31 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e120001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:31 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00 '], 0x0) [ 533.616076][ T7891] affs: No valid root block on device loop2 05:18:31 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x4800, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e100001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10700}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:31 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\xff\xff\xff\xff\xff'], 0x0) 05:18:31 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\xc5'], 0x0) 05:18:31 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\xff'], 0x0) 05:18:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e001201", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:31 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00i'], 0x0) [ 533.924584][ T7999] affs: No valid root block on device loop2 05:18:31 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x8a'], 0x0) 05:18:31 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\xff'], 0x0) [ 534.094573][ T7999] affs: No valid root block on device loop2 05:18:31 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e250001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:31 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x7f'], 0x0) 05:18:31 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x4900, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e110001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10900}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e002001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:31 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\xff'], 0x0) 05:18:31 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x0f\xff\xff\xff\xff'], 0x0) 05:18:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e120001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:31 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\xef\xff\xff\xff\xff'], 0x0) [ 534.472952][ T8061] affs: No valid root block on device loop2 05:18:31 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e102001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10a00}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:31 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e480001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:32 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x4c00, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:32 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\xff\xff\xff\xff\xff'], 0x0) 05:18:32 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x02\x00\x00\x00'], 0x0) 05:18:32 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x03\x00\x00\x00'], 0x0) 05:18:32 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x04\x00\x00\x00'], 0x0) [ 534.815030][ T8138] affs: No valid root block on device loop2 05:18:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10b00}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:32 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x05\x00\x00\x00'], 0x0) 05:18:32 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x06\x00\x00\x00'], 0x0) 05:18:32 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e250001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:32 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e002501", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:32 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e4c0001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:32 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x5c00, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:32 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\a\x00\x00\x00'], 0x0) 05:18:32 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\b\x00\x00\x00'], 0x0) 05:18:32 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\t\x00\x00\x00'], 0x0) [ 535.217006][ T8213] affs: No valid root block on device loop2 05:18:32 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\n\x00\x00\x00'], 0x0) 05:18:32 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e410001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10c00}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:32 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e5c0001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:32 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e003f01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:32 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x6000, 0xd2bd}], 0x0, &(0x7f00000001c0)) [ 535.393581][ T8213] affs: No valid root block on device loop2 05:18:32 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\v\x00\x00\x00'], 0x0) 05:18:32 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\f\x00\x00\x00'], 0x0) 05:18:32 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\r\x00\x00\x00'], 0x0) 05:18:33 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x0e\x00\x00\x00'], 0x0) 05:18:33 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x10\x00\x00\x00'], 0x0) [ 535.653074][ T8293] affs: No valid root block on device loop2 05:18:33 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x11\x00\x00\x00'], 0x0) 05:18:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e480001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:33 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x12\x00\x00\x00'], 0x0) [ 535.815348][ T8293] affs: No valid root block on device loop2 05:18:33 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x18\x00\x00\x00'], 0x0) 05:18:33 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x6800, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10d00}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:33 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e004001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:33 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e680001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:33 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00#\x00\x00\x00'], 0x0) 05:18:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e4c0001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:33 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00%\x00\x00\x00'], 0x0) 05:18:33 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00H\x00\x00\x00'], 0x0) [ 536.272812][ T8369] affs: No valid root block on device loop2 05:18:33 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00L\x00\x00\x00'], 0x0) 05:18:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10e00}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e5c0001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:33 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\\\x00\x00\x00'], 0x0) [ 536.464258][ T8369] affs: No valid root block on device loop2 05:18:34 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x6c00, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:34 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e6c0001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:34 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00h\x00\x00\x00'], 0x0) 05:18:34 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e004801", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:34 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00l\x00\x00\x00'], 0x0) 05:18:34 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00t\x00\x00\x00'], 0x0) 05:18:34 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00z\x00\x00\x00'], 0x0) [ 536.843827][ T8453] affs: No valid root block on device loop2 05:18:34 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e004c01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:34 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e740001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10f00}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e680001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:34 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\xef\x00\x00\x00'], 0x0) 05:18:34 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x7400, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:34 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x03\x00\x00'], 0x0) 05:18:34 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x05\x00\x00'], 0x0) 05:18:34 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x06\x00\x00'], 0x0) 05:18:34 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e005c01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 537.432596][ T8554] affs: No valid root block on device loop2 05:18:34 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\a\x00\x00'], 0x0) 05:18:34 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e7a0001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:34 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\t\x00\x00'], 0x0) 05:18:35 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\n\x00\x00'], 0x0) 05:18:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x11020}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:35 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e6c0001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:35 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\v\x00\x00'], 0x0) [ 537.723262][ T8554] affs: No valid root block on device loop2 05:18:35 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x7a00, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:35 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\f\x00\x00'], 0x0) 05:18:35 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\r\x00\x00'], 0x0) 05:18:35 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x0e\x00\x00'], 0x0) 05:18:35 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e006801", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 537.949413][ T8644] affs: No valid root block on device loop2 05:18:35 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x11\x00\x00'], 0x0) 05:18:35 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e040201000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:35 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x12\x00\x00'], 0x0) 05:18:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x11100}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:35 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x18\x00\x00'], 0x0) [ 538.260919][ T8644] affs: No valid root block on device loop2 05:18:35 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e740001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:35 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00 \x00\x00'], 0x0) 05:18:35 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0xedc0, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:35 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e006c01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:35 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00#\x00\x00'], 0x0) 05:18:35 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00%\x00\x00'], 0x0) 05:18:35 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00H\x00\x00'], 0x0) 05:18:36 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000301000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:36 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00L\x00\x00'], 0x0) 05:18:36 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\\\x00\x00'], 0x0) [ 538.655051][ T8736] affs: No valid root block on device loop2 05:18:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x11200}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:36 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00h\x00\x00'], 0x0) [ 538.975976][ T8736] affs: No valid root block on device loop2 05:18:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e7a0001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:36 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00l\x00\x00'], 0x0) 05:18:36 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0xff0f, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e007401", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e040201", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:36 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e020401000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x12000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:36 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00t\x00\x00'], 0x0) 05:18:36 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00z\x00\x00'], 0x0) 05:18:36 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\xff\xef\x00\x00'], 0x0) [ 539.401080][ T8822] affs: No valid root block on device loop2 05:18:36 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\xef\xff\x00\x00'], 0x0) 05:18:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x12010}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:36 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e060401000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000301", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 539.532965][ T8822] affs: No valid root block on device loop2 05:18:37 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x20000, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:37 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e007a01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:37 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x80Q\x01\x00'], 0x0) 05:18:37 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x02\x00'], 0x0) 05:18:37 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x10\x00'], 0x0) 05:18:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x12500}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:37 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00 \x00'], 0x0) 05:18:37 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x808-\x00'], 0x0) [ 539.903875][ T8914] affs: No valid root block on device loop2 05:18:37 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\xe08-\x00'], 0x0) 05:18:37 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e0fff01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 540.059840][ T8914] affs: No valid root block on device loop2 05:18:37 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000501000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:37 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e020401", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:37 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x40000, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:37 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00 9-\x00'], 0x0) 05:18:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x14000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:37 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000000", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:37 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00 ;-\x00'], 0x0) 05:18:37 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x80;-\x00'], 0x0) 05:18:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x15c00}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:37 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000000", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 540.524463][ T8983] affs: No valid root block on device loop2 05:18:38 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x01'], 0x0) 05:18:38 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x02'], 0x0) 05:18:38 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000601000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:38 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e060401", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 540.754105][ T8983] affs: No valid root block on device loop2 05:18:38 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x60000, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:38 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x03'], 0x0) 05:18:38 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000000", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:38 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x04'], 0x0) 05:18:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x1ff0f}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:38 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x05'], 0x0) 05:18:38 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e040601000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:38 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000501", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:38 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x06'], 0x0) 05:18:38 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000000", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x3000000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 541.211499][ T9066] affs: No valid root block on device loop2 05:18:38 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x96\xd0.\x06'], 0x0) [ 541.413683][ T9066] affs: No valid root block on device loop2 05:18:38 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x80000, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:38 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000601", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:38 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\a'], 0x0) 05:18:38 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000701000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:38 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000300", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:39 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\b'], 0x0) 05:18:39 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\t'], 0x0) 05:18:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x4000000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:39 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\n'], 0x0) 05:18:39 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000901000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 541.813028][ T9177] affs: No valid root block on device loop2 05:18:39 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\v'], 0x0) 05:18:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e040601", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:39 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0xa0000, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:39 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\f'], 0x0) 05:18:39 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\r'], 0x0) 05:18:39 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x0e'], 0x0) 05:18:39 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000400", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:39 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\xbd\xd1\n\x0e'], 0x0) 05:18:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x8000000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:39 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000a01000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000701", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:39 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x10'], 0x0) [ 542.367615][ T9257] affs: No valid root block on device loop2 05:18:39 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x11'], 0x0) 05:18:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000901", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 542.532975][ T9257] affs: No valid root block on device loop2 05:18:40 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0xc0000, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:40 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000800", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:40 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x12'], 0x0) 05:18:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x70000000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:40 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000b01000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:40 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x18'], 0x0) 05:18:40 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00m\xb6\b\x18'], 0x0) 05:18:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x2, &(0x7f0000000040)=ANY=[]) [ 542.860466][ T9328] affs: No valid root block on device loop2 05:18:40 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\xbe9,\x1b'], 0x0) 05:18:40 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0xe0000, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:40 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e003700", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:40 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000a01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:40 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\xe4\x062\x1d'], 0x0) 05:18:40 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000c01000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:40 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x009\xc5f\x1d'], 0x0) 05:18:40 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00 '], 0x0) 05:18:40 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00-9 '], 0x0) [ 543.330000][ T9382] affs: No valid root block on device loop2 05:18:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x3, &(0x7f0000000040)=ANY=[]) 05:18:40 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00-; '], 0x0) 05:18:40 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\xec\x9bW '], 0x0) 05:18:40 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00#'], 0x0) 05:18:41 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x400000, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:41 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000201", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:41 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000b01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:41 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\xe6\x1dr#'], 0x0) [ 543.687660][ T9457] affs: No valid root block on device loop2 05:18:41 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000d01000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:41 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x92r\x9b#'], 0x0) 05:18:41 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00%'], 0x0) 05:18:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x4, &(0x7f0000000040)=ANY=[]) 05:18:41 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00b d\''], 0x0) [ 543.980918][ T9457] affs: No valid root block on device loop2 05:18:41 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00C\xed\xd0.'], 0x0) 05:18:41 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\xd7\x17\xa90'], 0x0) 05:18:41 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0xe0ffff, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:41 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000c01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:41 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000301", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:41 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x9a\xf3\xb87'], 0x0) 05:18:41 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x1df\xc59'], 0x0) 05:18:41 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000e01000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:41 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00v\xbb\x8e:'], 0x0) 05:18:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x5, &(0x7f0000000040)=ANY=[]) [ 544.446057][ T9561] affs: No valid root block on device loop2 05:18:41 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00c\xac\xb5<'], 0x0) [ 544.641695][ T9561] affs: No valid root block on device loop2 05:18:42 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000f01000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x6, &(0x7f0000000040)=ANY=[]) 05:18:42 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000401", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:42 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x1000000, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:42 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000d01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:42 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x89\x06\xc9>'], 0x0) 05:18:42 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00.\xd0\xedC'], 0x0) 05:18:42 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00H'], 0x0) 05:18:42 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x91A\xf7H'], 0x0) [ 544.970142][ T9626] affs: No valid root block on device loop2 05:18:42 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00L'], 0x0) 05:18:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x7, &(0x7f0000000040)=ANY=[]) 05:18:42 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000501", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:42 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e201001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:42 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00Ok\xd1M'], 0x0) 05:18:42 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x82\xc8ZN'], 0x0) 05:18:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x8, &(0x7f0000000040)=ANY=[]) [ 545.303213][ T9626] affs: No valid root block on device loop2 05:18:42 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000e01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:42 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x10e0000, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:42 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00M\xd1kO'], 0x0) 05:18:42 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x94\'\x1cX'], 0x0) [ 545.441297][ T9701] affs: No valid root block on device loop2 05:18:42 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\\'], 0x0) 05:18:43 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00p\xb7\xe2\\'], 0x0) [ 545.560743][ T9701] affs: No valid root block on device loop2 05:18:43 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x9f\xa8Pa'], 0x0) 05:18:43 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000601", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:43 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x2000000, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:43 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\'d b'], 0x0) 05:18:43 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e001101000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x9, &(0x7f0000000040)=ANY=[]) 05:18:43 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000f01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:43 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x2040000, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:43 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00<\xb5\xacc'], 0x0) 05:18:43 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\xc9\x9c\x14d'], 0x0) 05:18:43 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\xeaJte'], 0x0) 05:18:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0xa, &(0x7f0000000040)=ANY=[]) 05:18:43 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00h'], 0x0) [ 546.167053][ T9812] affs: No valid root block on device loop2 05:18:43 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000701", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:43 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e001201000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:43 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x3000000, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:43 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e201001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:43 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\xf7*\xb1i'], 0x0) 05:18:43 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x8d\xe4\xbbk'], 0x0) 05:18:43 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00l'], 0x0) 05:18:43 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000801", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0xb, &(0x7f0000000040)=ANY=[]) 05:18:43 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x18\b\xb6m'], 0x0) 05:18:43 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\\\xe2\xb7p'], 0x0) [ 546.548273][ T9862] affs: No valid root block on device loop2 05:18:44 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x4000000, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:44 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00t'], 0x0) 05:18:44 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e002001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:44 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e001101", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:44 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00:\x8e\xbbv'], 0x0) 05:18:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0xc, &(0x7f0000000040)=ANY=[]) 05:18:44 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000901", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:44 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x86\x13\xa3w'], 0x0) [ 547.007181][ T9921] affs: No valid root block on device loop2 05:18:44 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00z'], 0x0) [ 547.077827][ T9921] affs: No valid root block on device loop2 05:18:44 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e001201", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:44 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x5000000, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:44 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000a01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:44 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e102001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0xd, &(0x7f0000000040)=ANY=[]) 05:18:44 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00-8\x80'], 0x0) 05:18:44 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00-;\x80'], 0x0) 05:18:44 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000b01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 547.419225][ T9978] affs: No valid root block on device loop2 05:18:44 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x01Q\x80'], 0x0) 05:18:44 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x7f\x80'], 0x0) 05:18:45 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e002001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0xe, &(0x7f0000000040)=ANY=[]) [ 547.584915][ T9978] affs: No valid root block on device loop2 05:18:45 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x6000000, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:45 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e002501000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:45 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00NZ\xc8\x82'], 0x0) 05:18:45 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000c01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:45 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00w\xa3\x13\x86'], 0x0) 05:18:45 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x91\xafY\x87'], 0x0) 05:18:45 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e102001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 547.856163][T10052] affs: No valid root block on device loop2 05:18:45 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00>\xc9\x06\x89'], 0x0) 05:18:45 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x6040000, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:45 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000d01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:45 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\xfd\xa7h\x8a'], 0x0) [ 548.129313][T10101] affs: No valid root block on device loop2 05:18:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0xf, &(0x7f0000000040)=ANY=[]) 05:18:45 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e003f01000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:45 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e002501", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:45 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\xff\xff\xff\x8c'], 0x0) 05:18:45 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x7000000, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:45 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\xb5\x1e\xb6\x8d'], 0x0) 05:18:45 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00k\xbb\xe4\x8d'], 0x0) 05:18:45 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00H\xf7A\x91'], 0x0) 05:18:45 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x87Y\xaf\x91'], 0x0) 05:18:45 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000e01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:45 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00#\x9br\x92'], 0x0) [ 548.533502][T10158] affs: No valid root block on device loop2 05:18:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x10, &(0x7f0000000040)=ANY=[]) 05:18:46 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\xba\v\xe1\x92'], 0x0) [ 548.687838][T10158] affs: No valid root block on device loop2 05:18:46 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e004001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:46 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e003f01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:46 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x8000000, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:46 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00X\x1c\'\x94'], 0x0) 05:18:46 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x06.\xd0\x96'], 0x0) 05:18:46 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x007\xb8\xf3\x9a'], 0x0) 05:18:46 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000f01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 549.020965][T10228] affs: No valid root block on device loop2 05:18:46 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00aP\xa8\x9f'], 0x0) 05:18:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x11, &(0x7f0000000040)=ANY=[]) 05:18:46 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e004801000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:46 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e004001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:46 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x9000000, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:46 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e001001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:46 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\xe0\xb9\xb3\xad'], 0x0) 05:18:46 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\xc5\xd3G\xae'], 0x0) 05:18:46 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\xb4\xcfW\xb0'], 0x0) 05:18:46 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\xb9^\xb4\xb4'], 0x0) 05:18:46 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\xb0W\xcf\xb4'], 0x0) 05:18:46 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x8d\xb6\x1e\xb5'], 0x0) [ 549.526233][T10304] affs: No valid root block on device loop2 05:18:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x12, &(0x7f0000000040)=ANY=[]) 05:18:47 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e004c01000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:47 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e004101", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:47 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\xb4\xb4^\xb9'], 0x0) 05:18:47 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0xa000000, 0xd2bd}], 0x0, &(0x7f00000001c0)) [ 549.762425][T10304] affs: No valid root block on device loop2 05:18:47 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e001101", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:47 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x92\xe1\v\xba'], 0x0) 05:18:47 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e004801", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:47 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e005c01000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x25, &(0x7f0000000040)=ANY=[]) [ 550.021979][T10367] affs: No valid root block on device loop2 05:18:47 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\xd3|\xee\xbb'], 0x0) 05:18:47 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x0e\n\xd1\xbd'], 0x0) 05:18:47 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x1b,9\xbe'], 0x0) 05:18:47 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\xf5\x93\xa4\xc5'], 0x0) [ 550.294779][T10367] affs: No valid root block on device loop2 05:18:47 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0xb000000, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:47 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\xaeG\xd3\xc5'], 0x0) 05:18:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x5c, &(0x7f0000000040)=ANY=[]) 05:18:47 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e001201", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:47 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e004c01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:47 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00d\x14\x9c\xc9'], 0x0) 05:18:48 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e006801000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:48 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\xbb\xee|\xd3'], 0x0) [ 550.665970][T10441] affs: No valid root block on device loop2 05:18:48 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\xdb\x1e\xdd\xd6'], 0x0) [ 550.795916][T10441] affs: No valid root block on device loop2 05:18:48 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x000\xa9\x17\xd7'], 0x0) 05:18:48 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e006c01000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x204, &(0x7f0000000040)=ANY=[]) 05:18:48 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0xc000000, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:48 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e002501", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:48 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e005c01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:48 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\xd6\xdd\x1e\xdb'], 0x0) 05:18:48 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00-8\xe0'], 0x0) 05:18:48 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\xad\xb3\xb9\xe0'], 0x0) 05:18:48 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x1d2\x06\xe4'], 0x0) 05:18:48 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00#r\x1d\xe6'], 0x0) 05:18:48 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00etJ\xea'], 0x0) 05:18:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x300, &(0x7f0000000040)=ANY=[]) [ 551.382795][T10561] affs: No valid root block on device loop2 05:18:48 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e007401000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:48 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00 W\x9b\xec'], 0x0) [ 551.502000][T10561] affs: No valid root block on device loop2 05:18:49 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0xd000000, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e006801", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:49 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e004801", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:49 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\xff\xff\xff\xef'], 0x0) 05:18:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x402, &(0x7f0000000040)=ANY=[]) 05:18:49 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\xc5\xa4\x93\xf5'], 0x0) 05:18:49 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\xff\xff\xff\xf6'], 0x0) 05:18:49 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00i\xb1*\xf7'], 0x0) [ 551.876840][T10636] affs: No valid root block on device loop2 05:18:49 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0xe000000, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e006c01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:49 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e007a01000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x406, &(0x7f0000000040)=ANY=[]) 05:18:49 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e004c01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:49 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x8ah\xa7\xfd'], 0x0) 05:18:49 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\xff\xff\xff\xfe'], 0x0) [ 552.093955][T10653] affs: No valid root block on device loop2 05:18:49 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x7f\xff\xff\xff'], 0x0) 05:18:49 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x8c\xff\xff\xff'], 0x0) [ 552.258975][T10653] affs: No valid root block on device loop2 05:18:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x500, &(0x7f0000000040)=ANY=[]) 05:18:49 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e0fff01000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:49 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0xf000000, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e007401", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:49 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\xef\xff\xff\xff'], 0x0) 05:18:49 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e005c01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:49 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\xf6\xff\xff\xff'], 0x0) 05:18:49 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\xfe\xff\xff\xff'], 0x0) 05:18:49 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x7f\xff'], 0x0) 05:18:50 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:50 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\xf0\xff\xff'], 0x0) 05:18:50 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x10`\x8f\xd4'], 0x0) [ 552.718881][T10756] affs: No valid root block on device loop2 [ 552.795901][T10756] affs: No valid root block on device loop2 05:18:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x600, &(0x7f0000000040)=ANY=[]) 05:18:50 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000000030000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:50 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x10000000, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:50 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:50 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e007a01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:50 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e006801", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:50 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\xc0'], 0x0) 05:18:50 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000000040000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:50 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e006c01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x604, &(0x7f0000000040)=ANY=[]) 05:18:50 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e0fff01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:50 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\xe0\xff'], 0x0) [ 553.329467][T10829] affs: No valid root block on device loop2 05:18:50 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\xe0\xef\xff'], 0x0) 05:18:50 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\xe0\xff\xff'], 0x0) 05:18:51 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x11000000, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:51 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000000080000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:51 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e007401", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:51 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x7f\xff'], 0x0) [ 553.592413][T10829] affs: No valid root block on device loop2 05:18:51 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:51 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) [ 553.795830][T10916] affs: No valid root block on device loop2 05:18:51 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000000", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x700, &(0x7f0000000040)=ANY=[]) 05:18:51 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x12000000, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:51 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e007a01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:51 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000000100000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:51 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:51 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:51 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x7f\xff'], 0x0) 05:18:51 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x7f\xff'], 0x0) 05:18:51 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x0f\xff'], 0x0) [ 554.212322][T10941] affs: No valid root block on device loop2 05:18:51 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:51 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:51 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000000", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 554.392630][T10941] affs: No valid root block on device loop2 05:18:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x900, &(0x7f0000000040)=ANY=[]) 05:18:51 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x17130000, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:51 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000003", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:51 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:51 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000000920000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:51 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:52 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) [ 554.620406][T11034] affs: No valid root block on device loop2 05:18:52 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:52 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000005", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 554.727848][T11034] affs: No valid root block on device loop2 05:18:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0xa00, &(0x7f0000000040)=ANY=[]) 05:18:52 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000300000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:52 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000000", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:52 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:52 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x20000000, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:52 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:52 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000400000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 555.102406][T11087] affs: No valid root block on device loop2 05:18:52 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:52 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e00000a", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:52 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0xb00, &(0x7f0000000040)=ANY=[]) 05:18:52 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e00000b", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:52 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000000", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 555.317315][T11087] affs: No valid root block on device loop2 05:18:52 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:52 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:52 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:52 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x20100000, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:53 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:53 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000800000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:53 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\xff\xff\xff\xff'], 0x0) 05:18:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0xc00, &(0x7f0000000040)=ANY=[]) [ 555.733645][T11175] affs: No valid root block on device loop2 05:18:53 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) [ 555.783826][T11175] affs: No valid root block on device loop2 05:18:53 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x25000000, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:53 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e00000f", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:53 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000300", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:53 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00w\x7f'], 0x0) 05:18:53 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:53 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:53 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:53 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e00003f", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 556.121965][T11246] affs: No valid root block on device loop2 05:18:53 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e001000000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0xd00, &(0x7f0000000040)=ANY=[]) 05:18:53 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:53 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000400", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:53 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x3f000000, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:53 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:53 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) [ 556.462533][T11303] affs: No valid root block on device loop2 05:18:53 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x40000000, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:54 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e009200000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:54 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000040", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:54 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000800", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0xe00, &(0x7f0000000040)=ANY=[]) 05:18:54 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:54 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:54 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:54 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e00ee00", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:54 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x48000000, 0xd2bd}], 0x0, &(0x7f00000001c0)) [ 556.861962][T11320] affs: No valid root block on device loop2 05:18:54 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:54 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:54 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:54 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000201000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0xf00, &(0x7f0000000040)=ANY=[]) 05:18:54 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:54 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000064", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:54 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) [ 557.244795][T11402] affs: No valid root block on device loop2 05:18:54 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:54 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:54 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000201", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:54 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x49000000, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:54 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x1020, &(0x7f0000000040)=ANY=[]) 05:18:54 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:55 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000301000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:55 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:55 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000002", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:55 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) [ 557.754797][T11480] affs: No valid root block on device loop2 05:18:55 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000301", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:55 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:55 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x4c000000, 0xd2bd}], 0x0, &(0x7f00000001c0)) [ 557.831033][T11480] affs: No valid root block on device loop2 05:18:55 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:55 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x1100, &(0x7f0000000040)=ANY=[]) 05:18:55 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:55 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) [ 558.102345][T11535] affs: No valid root block on device loop2 05:18:55 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000401000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:55 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x5c000000, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:55 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000003", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:55 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x1200, &(0x7f0000000040)=ANY=[]) 05:18:55 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000401", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:55 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:55 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:55 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:55 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:55 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000501000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 558.482226][T11596] affs: No valid root block on device loop2 05:18:55 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000004", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:55 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:56 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:56 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x60000000, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:56 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:56 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x2000, &(0x7f0000000040)=ANY=[]) 05:18:56 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000501", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:56 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:56 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x2010, &(0x7f0000000040)=ANY=[]) 05:18:56 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000601000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:56 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000005", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 558.888108][T11665] affs: No valid root block on device loop2 05:18:56 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:56 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:56 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:56 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x2500, &(0x7f0000000040)=ANY=[]) [ 559.138493][T11665] affs: No valid root block on device loop2 05:18:56 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x68000000, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:56 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:56 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000008", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:56 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000601", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:56 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000701000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:56 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:56 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:56 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:56 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) [ 559.499142][T11750] affs: No valid root block on device loop2 05:18:57 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:57 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x4000, &(0x7f0000000040)=ANY=[]) 05:18:57 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) [ 559.736804][T11750] affs: No valid root block on device loop2 05:18:57 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x6c000000, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:57 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e00000a", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:57 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000701", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:57 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:57 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000801000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:57 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:57 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:57 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x5c00, &(0x7f0000000040)=ANY=[]) 05:18:57 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) [ 560.129235][T11835] affs: No valid root block on device loop2 05:18:57 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:57 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:57 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e00000b", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:57 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x74000000, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:57 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000801", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:57 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000901000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:57 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:57 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:57 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:58 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) [ 560.708200][T11932] affs: No valid root block on device loop2 05:18:58 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0xedc0, &(0x7f0000000040)=ANY=[]) 05:18:58 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e00000f", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:58 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:58 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x7a000000, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:58 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000a01000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:58 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000901", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:58 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:58 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000064", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:58 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0xff0f, &(0x7f0000000040)=ANY=[]) 05:18:58 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) [ 561.057006][T11986] affs: No valid root block on device loop2 05:18:58 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x8cffffff, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:58 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:58 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\xff\xff\xff\xff'], 0x0) 05:18:58 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000a01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:58 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:58 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000000", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:58 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000b01000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:58 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:58 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:58 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x400000, &(0x7f0000000040)=ANY=[]) 05:18:58 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:58 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) [ 561.516510][T12042] affs: No valid root block on device loop2 [ 561.702183][T12042] affs: No valid root block on device loop2 05:18:59 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0xc0ed0000, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:59 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x1000000, &(0x7f0000000040)=ANY=[]) 05:18:59 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000b01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:59 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000000", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:59 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000c01000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:59 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:18:59 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x0f\xff\xff\xff'], 0x0) [ 561.921001][T12115] affs: No valid root block on device loop2 05:18:59 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\xef\xff\xff\xff'], 0x0) 05:18:59 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\xff\xff\xff\xff'], 0x0) [ 562.067170][T12115] affs: No valid root block on device loop2 05:18:59 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000c01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:59 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000d01000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:59 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0xf6ffffff, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:18:59 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e0000f9", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:18:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x2000000, &(0x7f0000000040)=ANY=[]) 05:18:59 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x02\x00\x00'], 0x0) 05:18:59 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x03\x00\x00'], 0x0) 05:18:59 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x04\x00\x00'], 0x0) 05:18:59 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x05\x00\x00'], 0x0) 05:18:59 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x06\x00\x00'], 0x0) 05:18:59 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\a\x00\x00'], 0x0) 05:18:59 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000e01000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 562.524273][T12204] affs: No valid root block on device loop2 05:19:00 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000d01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:00 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\b\x00\x00'], 0x0) [ 562.649440][T12204] affs: No valid root block on device loop2 05:19:00 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0xf9fdffff, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:19:00 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x2040000, &(0x7f0000000040)=ANY=[]) 05:19:00 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\t\x00\x00'], 0x0) 05:19:00 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000098", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:00 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\n\x00\x00'], 0x0) 05:19:00 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\v\x00\x00'], 0x0) 05:19:00 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\f\x00\x00'], 0x0) 05:19:00 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x3000000, &(0x7f0000000040)=ANY=[]) 05:19:00 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000f01000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:00 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\r\x00\x00'], 0x0) 05:19:00 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000e01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:00 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x0e\x00\x00'], 0x0) [ 563.212498][T12291] affs: No valid root block on device loop2 05:19:00 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0xfbffffff, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:19:00 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e001001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:00 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x10\x00\x00'], 0x0) 05:19:00 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000098", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:00 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x11\x00\x00'], 0x0) [ 563.435609][T12340] affs: No valid root block on device loop2 05:19:00 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0xfdfdffff, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:19:00 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e001101000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:01 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x4000000, &(0x7f0000000040)=ANY=[]) 05:19:01 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x12\x00\x00'], 0x0) [ 563.691529][T12368] affs: No valid root block on device loop2 05:19:01 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x18\x00\x00'], 0x0) 05:19:01 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000f01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:01 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00#\x00\x00'], 0x0) 05:19:01 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0xff0f0000, 0xd2bd}], 0x0, &(0x7f00000001c0)) [ 563.887249][T12368] affs: No valid root block on device loop2 05:19:01 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00%\x00\x00'], 0x0) 05:19:01 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e0000ff", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:01 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e001201000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:01 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x5000000, &(0x7f0000000040)=ANY=[]) 05:19:01 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00H\x00\x00'], 0x0) 05:19:01 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00L\x00\x00'], 0x0) 05:19:01 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\\\x00\x00'], 0x0) [ 564.153987][T12413] affs: No valid root block on device loop2 05:19:01 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00h\x00\x00'], 0x0) 05:19:01 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e001001", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:01 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00l\x00\x00'], 0x0) 05:19:01 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e002501000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 564.311962][T12413] affs: No valid root block on device loop2 05:19:01 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x6000000, &(0x7f0000000040)=ANY=[]) 05:19:01 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0xffefffff, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:19:02 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x5c, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:02 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00t\x00\x00'], 0x0) 05:19:02 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00z\x00\x00'], 0x0) 05:19:02 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\xef\x00\x00'], 0x0) 05:19:02 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x03\x00'], 0x0) [ 564.752247][T12491] affs: No valid root block on device loop2 05:19:02 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x05\x00'], 0x0) 05:19:02 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x06\x00'], 0x0) 05:19:02 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e001101", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:02 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e004801000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:02 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\a\x00'], 0x0) 05:19:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x6040000, &(0x7f0000000040)=ANY=[]) 05:19:02 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0xfff7ffff, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:19:02 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0xffffffffffffffff, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:02 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\t\x00'], 0x0) 05:19:02 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e004c01000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x7000000, &(0x7f0000000040)=ANY=[]) 05:19:02 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e001201", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 565.239165][T12587] affs: No valid root block on device loop2 05:19:02 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\n\x00'], 0x0) 05:19:02 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\v\x00'], 0x0) 05:19:02 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\f\x00'], 0x0) 05:19:02 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\r\x00'], 0x0) [ 565.453679][T12587] affs: No valid root block on device loop2 05:19:03 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x8000000, &(0x7f0000000040)=ANY=[]) 05:19:03 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0xfffbffff, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:19:03 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e002501", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:03 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e005c01000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:03 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10002}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:03 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x0e\x00'], 0x0) 05:19:03 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x9000000, &(0x7f0000000040)=ANY=[]) [ 565.820879][T12654] affs: No valid root block on device loop2 05:19:03 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x11\x00'], 0x0) 05:19:03 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0xfffdffff, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:19:03 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x12\x00'], 0x0) 05:19:03 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e004101", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 565.972014][T12654] affs: No valid root block on device loop2 05:19:03 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e006801000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:03 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x18\x00'], 0x0) 05:19:03 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00 \x00'], 0x0) [ 566.143693][T12694] affs: No valid root block on device loop2 05:19:03 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00#\x00'], 0x0) [ 566.289850][T12694] affs: No valid root block on device loop2 05:19:03 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00%\x00'], 0x0) 05:19:03 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10003}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:03 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00H\x00'], 0x0) 05:19:03 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0xffffe000, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:19:03 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0xa000000, &(0x7f0000000040)=ANY=[]) 05:19:03 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00L\x00'], 0x0) 05:19:04 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\\\x00'], 0x0) 05:19:04 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e004801", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:04 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e006c01000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:04 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00h\x00'], 0x0) [ 566.682823][T12770] affs: No valid root block on device loop2 05:19:04 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00l\x00'], 0x0) 05:19:04 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00t\x00'], 0x0) 05:19:04 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00z\x00'], 0x0) 05:19:04 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10004}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:04 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0xb000000, &(0x7f0000000040)=ANY=[]) 05:19:04 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0xffffefff, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:19:04 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\xff\xef\x00'], 0x0) 05:19:04 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\xef\xff\x00'], 0x0) 05:19:04 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x80Q\x01'], 0x0) [ 567.256312][T12864] affs: No valid root block on device loop2 05:19:04 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e004c01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:04 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e007401000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:04 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x02'], 0x0) 05:19:04 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x10'], 0x0) 05:19:04 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0xc000000, &(0x7f0000000040)=ANY=[]) 05:19:04 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00 '], 0x0) 05:19:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10005}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:05 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x808-'], 0x0) 05:19:05 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0xfffff7ff, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:19:05 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e005c01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:05 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\xe08-'], 0x0) 05:19:05 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e007a01000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 567.753904][T12930] affs: No valid root block on device loop2 05:19:05 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0xfffffbff, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:19:05 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00 9-'], 0x0) 05:19:05 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e006801", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:05 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0xd000000, &(0x7f0000000040)=ANY=[]) 05:19:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10006}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:05 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00 ;-'], 0x0) 05:19:05 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000003000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:05 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x80;-'], 0x0) 05:19:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10007}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:05 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) [ 568.083655][T12992] affs: No valid root block on device loop2 05:19:05 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:19:05 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e006c01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 568.243545][T12992] affs: No valid root block on device loop2 05:19:05 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0xfffffdf9, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:19:05 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:19:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10008}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:05 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0xe000000, &(0x7f0000000040)=ANY=[]) 05:19:05 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000005000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:05 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:19:06 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:19:06 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) [ 568.696587][T13054] affs: No valid root block on device loop2 05:19:06 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e007401", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:06 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0xfffffdfd, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:19:06 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x96\xd0.'], 0x0) 05:19:06 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) [ 568.931972][T13104] affs: No valid root block on device loop2 05:19:06 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0xfffffdff, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:19:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10009}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:06 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:19:06 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0xf000000, &(0x7f0000000040)=ANY=[]) 05:19:06 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e007a01", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:06 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:19:06 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e00000a000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:06 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) [ 569.184555][T13140] affs: No valid root block on device loop2 05:19:06 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:19:06 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:19:06 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) [ 569.412512][T13140] affs: No valid root block on device loop2 05:19:06 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0xffffff7f, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:19:06 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:19:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x1000a}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:07 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\xbd\xd1\n'], 0x0) 05:19:07 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e00000b000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:07 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000003", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x10000000, &(0x7f0000000040)=ANY=[]) 05:19:07 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:19:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x1000b}], 0x0, &(0x7f0000000040)=ANY=[]) [ 569.936936][T13222] affs: No valid root block on device loop2 05:19:07 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:19:07 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0xffffff8c, 0xd2bd}], 0x0, &(0x7f00000001c0)) [ 570.063085][T13222] affs: No valid root block on device loop2 05:19:07 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000005", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:07 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e00000f000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x11000000, &(0x7f0000000040)=ANY=[]) 05:19:07 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:19:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x1000c}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:07 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:19:07 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00m\xb6\b'], 0x0) 05:19:07 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\xbe9,'], 0x0) [ 570.398473][T13283] affs: No valid root block on device loop2 05:19:07 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\xe4\x062'], 0x0) 05:19:07 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x009\xc5f'], 0x0) [ 570.528264][T13283] affs: No valid root block on device loop2 05:19:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e00003f000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:08 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0xfffffff6, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:19:08 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e00000a", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:08 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x12000000, &(0x7f0000000040)=ANY=[]) 05:19:08 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:19:08 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00-9'], 0x0) 05:19:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x1000d}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:08 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00-;'], 0x0) 05:19:08 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x20000000, &(0x7f0000000040)=ANY=[]) 05:19:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000040000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 571.102331][T13377] affs: No valid root block on device loop2 05:19:08 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\xec\x9bW'], 0x0) 05:19:08 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:19:08 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e00000b", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) [ 571.279301][T13377] affs: No valid root block on device loop2 05:19:08 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0xfffffffb, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:19:08 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\xe6\x1dr'], 0x0) 05:19:08 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x20100000, &(0x7f0000000040)=ANY=[]) 05:19:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x1000e}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000064000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:08 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x92r\x9b'], 0x0) 05:19:08 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00'], 0x0) 05:19:09 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00b d'], 0x0) [ 571.609541][T13443] affs: No valid root block on device loop2 05:19:09 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e00000f", 0x33, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:09 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x10000}], 0x25000000, &(0x7f0000000040)=ANY=[]) 05:19:09 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00C\xed\xd0'], 0x0) 05:19:09 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\xd7\x17\xa9'], 0x0) 05:19:09 executing program 2: syz_mount_image$affs(&(0x7f0000000000)='affs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{0x0, 0x8000000000, 0xd2bd}], 0x0, &(0x7f00000001c0)) 05:19:09 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000002000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="77b281be2edfd5824c9aee02257845e976cb8868622450cfefc0901fc45e1ffa024f85f49009464a95047a7b7f5c247e000001", 0x33, 0x1000f}], 0x0, &(0x7f0000000040)=ANY=[]) 05:19:09 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x9a\xf3\xb8'], 0x0) 05:19:09 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execve(&(0x7f0000000480)='./file0\x00', &(0x7f0000000840)=[&(0x7f00000000c0)='\x00\x00\x1df\xc5'], 0x0) [ 571.964774][T13510] affs: No valid root block on device loop2 [ 572.038363][T13532] ================================================================== [ 572.046506][T13532] BUG: KCSAN: data-race in bprm_execve / copy_process [ 572.053266][T13532] [ 572.055571][T13532] write to 0xffff8881013cd490 of 4 bytes by task 13533 on cpu 1: [ 572.063258][T13532] bprm_execve+0x584/0x620 [ 572.067646][T13532] do_execveat_common+0x60c/0x6c0 [ 572.072640][T13532] __x64_sys_execve+0x56/0x70 [ 572.077297][T13532] do_syscall_64+0x39/0x80 [ 572.081698][T13532] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 572.087764][T13532] [ 572.090069][T13532] read to 0xffff8881013cd490 of 4 bytes by task 13532 on cpu 0: [ 572.097674][T13532] copy_process+0xd01/0x2d70 [ 572.102236][T13532] kernel_clone+0x14b/0x680 [ 572.106721][T13532] __x64_sys_clone+0xc8/0xf0 [ 572.111282][T13532] do_syscall_64+0x39/0x80 [ 572.115684][T13532] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 572.121556][T13532] [ 572.123878][T13532] Reported by Kernel Concurrency Sanitizer on: [ 572.130016][T13532] CPU: 0 PID: 13532 Comm: syz-executor.4 Not tainted 5.10.0-rc7-syzkaller #0 [ 572.138760][T13532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 572.148786][T13532] ================================================================== [ 572.156818][T13532] Kernel panic - not syncing: panic_on_warn set ... [ 572.163387][T13532] CPU: 0 PID: 13532 Comm: syz-executor.4 Not tainted 5.10.0-rc7-syzkaller #0 [ 572.172125][T13532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 572.182152][T13532] Call Trace: [ 572.185430][T13532] dump_stack+0x116/0x15d [ 572.189733][T13532] panic+0x1e7/0x5fa [ 572.193615][T13532] ? vprintk_emit+0x2f2/0x370 [ 572.198268][T13532] kcsan_report+0x67b/0x680 [ 572.202744][T13532] ? __rcu_read_unlock+0x51/0x220 [ 572.207743][T13532] ? kcsan_setup_watchpoint+0x46a/0x4d0 [ 572.213279][T13532] ? copy_process+0xd01/0x2d70 [ 572.218027][T13532] ? kernel_clone+0x14b/0x680 [ 572.222691][T13532] ? __x64_sys_clone+0xc8/0xf0 [ 572.227430][T13532] ? do_syscall_64+0x39/0x80 [ 572.231994][T13532] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 572.238052][T13532] kcsan_setup_watchpoint+0x46a/0x4d0 [ 572.243399][T13532] copy_process+0xd01/0x2d70 [ 572.247971][T13532] ? __switch_to+0x14e/0x4c0 [ 572.252541][T13532] kernel_clone+0x14b/0x680 [ 572.257051][T13532] __x64_sys_clone+0xc8/0xf0 [ 572.261655][T13532] do_syscall_64+0x39/0x80 [ 572.266081][T13532] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 572.271959][T13532] RIP: 0033:0x460b29 [ 572.275847][T13532] Code: ff 48 85 f6 0f 84 37 8a fb ff 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 0f 8c 0e 8a fb ff 74 01 c3 31 ed 48 f7 c7 00 00 01 00 75 [ 572.295434][T13532] RSP: 002b:00007ffd2fa3a2f8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 572.303838][T13532] RAX: ffffffffffffffda RBX: 00007f1eca474700 RCX: 0000000000460b29 [ 572.311788][T13532] RDX: 00007f1eca4749d0 RSI: 00007f1eca473db0 RDI: 00000000003d0f00 [ 572.319734][T13532] RBP: 00007ffd2fa3a510 R08: 00007f1eca474700 R09: 00007f1eca474700 [ 572.327690][T13532] R10: 00007f1eca4749d0 R11: 0000000000000202 R12: 0000000000000000 [ 572.335636][T13532] R13: 00007ffd2fa3a3af R14: 0000000000020000 R15: 0000000003568db0 [ 572.344159][T13532] Kernel Offset: disabled [ 572.348468][T13532] Rebooting in 86400 seconds..